UNCAPT Logo
UNCAPT
Reasoning OS

Security at Uncapt

Effective: 15-Jul-2024 | Version: 1.0

Publisher: Uncapt Pty Ltd (ACN 641 190 552), Level 4, 83 Mount Street, North Sydney, NSW 2060, Australia

This page summarises Uncapt's technical and organisational measures to protect Customer Data and operate the Uncapt Reasoning Platform securely. It is incorporated by reference into the Terms (https://uncapt.com/terms) and the DPA (https://uncapt.com/legal/dpa).

Security Governance
  • Information Security Management System (ISMS) aligned to ISO/IEC 27001 practices (policies, risk assessment and treatment, continuous improvement).
  • Documented policies: access control, acceptable use, cryptography, secure development, vendor risk, incident response, change management, backup/DR, data retention, privacy.
  • Security training for all personnel; role‑based training for engineers; background checks for employees where permitted by law.
  • Security and privacy by design: risk assessment and data‑protection considerations are embedded in product and project lifecycles.
  • Separation of duties; least‑privilege by default; periodic access reviews.
Shared Responsibility Model

Security responsibilities depend on deployment.

SaaS (Uncapt‑hosted)

AreaUncaptCustomer
Application‑layer security and operations
Hosting and storage of platform data under Uncapt control
Backups/DR for SaaS platform data
Monitoring, logging, and incident response (app layer)
User provisioning, RBAC, credential hygiene
Data quality, lawful data use, AUP compliance
SSO/IdP configuration (if used)

VPC / On‑Prem (Customer‑managed base)

AreaUncaptCustomer
Platform application components per runbook/SOW
Base infrastructure, network, OS/hypervisor
IAM/SSO, identity lifecycle
Backups of Customer‑managed layers
Physical security and endpoint controls
Infra/network monitoring and patching
Access Control and Identity
  • Role‑based access control (RBAC) and least‑privilege access.
  • MFA enforced for administrative and privileged accounts.
  • Centralised identity for production access; just‑in‑time elevation for sensitive operations where applicable.
  • Segregation of environments (dev/test/stage/prod);
  • Quarterly access reviews; immediate revocation on role change or termination.
Data Protection
  • Encryption in transit: TLS 1.2+ for all external communications and service‑to‑service calls where supported.
  • Encryption at rest: industry‑standard AES‑256 (or cloud‑equivalent) for databases, storage, and backups.
  • Key management: cloud KMS/HSM where applicable; key rotation per provider best practices and policy.
  • Secrets management: dedicated secrets vault; no secrets in code repositories; rotation on compromise or schedule.
  • Tenant isolation: logical segregation of Customer Data; strict access controls and guardrails.
  • Data minimisation and purpose limitation aligned to the DPA.
Secure Development (SSDLC)
  • Threat modelling for material features; design reviews for security and privacy.
  • Code review on all changes; CI/CD with automated checks.
  • Dependency management with vulnerability scanning (SCA).
  • Application security testing: SAST/DAST integrated into the pipeline where applicable; Manual security testing for high‑risk areas
  • Change management with approval workflow, rollback plans, and production change logging.
Vulnerability and Patch Management

Regular vulnerability scanning of applications and relevant infrastructure.

SLA targets for remediation (guideline, may vary by environment/criticality):

  • Critical: 7 days
  • High: 30 days
  • Medium: 90 days
  • Low: best effort
  • Emergency patching for actively exploited issues.
  • Third‑party libraries monitored and updated routinely.
Logging, Monitoring, and Detection
  • Centralised logging of security‑relevant events (auth, admin actions, configuration changes, data access patterns).
  • Time‑synchronised systems; tamper‑resistant log storage.
  • Alerting for anomalous activity and failed security controls.
  • Regular review of alerts and security dashboards.
Incident Response
  • Documented incident response plan with severity classification, roles and escalation paths.
  • Customer notifications for confirmed Security Incidents "without undue delay" consistent with the DPA; collaboration on containment, forensics, and remediation.
  • Post‑incident reviews and corrective actions for Sev 1/2 incidents; RCA summary provided per SLA.
Business Continuity and Disaster Recovery

SaaS backups of platform data under Uncapt control; periodic restoration testing.

Target objectives for SaaS (best‑efforts, see SLA):

  • RPO: 24 hours
  • RTO: 12 hours
  • Documented BCP/DR plans; annual exercises.
  • For VPC/On‑Prem, Customer is responsible for backups and DR of Customer‑managed layers.
Data Residency, Retention, and Deletion
  • Data residency and hosting regions as specified in your Order.
  • Retention aligned to contractual and legal requirements; data minimisation principles applied.
  • Exports: self‑service export features where available; assisted export on request (see Terms/DPA).
  • Deletion: on termination (or request), export then delete Personal Information from active systems and purge from backups per standard cycles; certification available on request (see DPA).
Subprocessors and Suppliers
  • Use of reputable cloud and service providers for hosting, monitoring, email delivery, ticketing, etc.
  • Security and privacy due diligence prior to onboarding; contractual obligations no less protective than the DPA.
  • Current subprocessors list available on request or in Annex B of the DPA.
  • Notifications of material changes to subprocessors per the DPA with an objection/transition process.
Network and Infrastructure Security
  • Network segmentation and security groups; least‑privilege firewall rules.
  • Managed WAFs and DDoS protections where applicable.
  • Hardened images and baseline configurations; CIS‑aligned benchmarks where feasible.
  • Bastion‑based administrative access with MFA and session logging.
Product‑Level Controls and Safety
  • Safety gates and governance layer baked into the Platform (quality gates, confidence scoring, human‑in‑the‑loop, audit trails).
  • Versioning of knowledge structures and logic; change approval workflows.
  • Audit trail generation for decisions and evidence provenance; configurable retention (see SLA/Order).
  • Guardrails to reduce harmful/unsafe outputs; monitoring of model performance and drift where relevant.
Privacy
  • Compliance with the Privacy Act 1988 (Cth) and applicable State health records laws; privacy‑by‑design principles.
  • DPA available at https://uncapt.com/legal/dpa, including Notifiable Data Breaches cooperation, subprocessors, cross‑border controls (APP 8), and data subject request assistance.
Customer Security Features
  • SSO (SAML/OIDC) and SCIM (where available) for centralised identity and provisioning.
  • RBAC with configurable roles/permissions.
  • IP allow‑listing and session controls (where available).
  • API authentication via OAuth2/bearer tokens; per‑client rate limits and scopes.
  • Export utilities for Customer Data.
Penetration Testing and Disclosure
  • Periodic third‑party penetration testing of the externally exposed application and APIs.
  • Findings triaged and remediated under the vulnerability SLAs above.
  • Coordinated Vulnerability Disclosure: report issues to security@uncapt.com; please include details (affected component, steps to reproduce, impact).
  • Do not perform unapproved penetration or load testing (see AUP).
Physical Security
  • For SaaS, Uncapt relies on leading cloud providers' certified data centres with industry‑standard physical and environmental controls (access controls, surveillance, redundant power/cooling).
  • For VPC/On‑Prem, Customer is responsible for data centre/office physical security and endpoint protections.
Compliance Statements
  • ISMS aligned with ISO/IEC 27001 practices.
  • Where formal certifications or attestations are achieved (e.g., ISO 27001, SOC 2), Uncapt will publish details or make reports available under NDA upon request.
  • Industry‑specific requirements (e.g., healthcare) are addressed contractually via SOWs/Orders where applicable.
Contacts and Status
Changes to this Page

We may update this Security Summary from time to time. Material changes will be reflected in the version/date above and, where relevant, notified alongside updates to the Terms/DPA/SLA.

Change Log

v1.0 (15-Jul-2024): Initial publication of the Security Measures Summary aligned to Terms/DPA/SLA.

Last updated: 15-Jul-2024