Compliance & Reports
Moontrace is committed to meeting global standards for security and compliance. We continuously monitor the regulatory landscape to ensure our platform and services adhere to the latest requirements for data protection and privacy.
Key Regulatory Bodies & Standardization Efforts
Governments and international bodies are actively working to standardize Post-Quantum Cryptography (PQC) algorithms. Staying informed about these efforts is crucial for compliance.
-
NIST Post-Quantum Cryptography (PQC) Project
Leading the global effort to standardize quantum-resistant public-key cryptographic algorithms.
-
U.S. National Security Memorandum 10 (NSM-10)
Directs U.S. government agencies to migrate to PQC and sets deadlines for developing quantum-resistant systems.
-
ETSI - Quantum-Safe Cryptography (QSC)
The European Telecommunications Standards Institute provides specifications for quantum-safe solutions.
-
ISO/IEC JTC 1/SC 27 - IT Security Techniques
This international committee is working on standardizing post-quantum algorithms.
Audit Reports & Certifications
We undergo regular third-party audits to verify our security controls. Contact us for access to our latest reports.
-
SOC 2 Type II Report
Details on controls relevant to security, availability, and confidentiality.
-
ISO 27001 Certification
Demonstrates our commitment to a systematic approach to managing sensitive company information.
-
CSA STAR Self-Assessment
Our completed Consensus Assessments Initiative Questionnaire (CAIQ) is available upon request.
Security & Post-Quantum Cryptography
Security is the foundation of everything we do. We employ a multi-layered defense strategy to protect our systems and your data from current and future threats, including those posed by quantum computers.
Our PQC Implementation
We are actively transitioning to quantum-resistant cryptography. Our approach includes:
- NIST-Standardized Algorithms: We are implementing algorithms selected by the U.S. National Institute of Standards and Technology (NIST), such as ML-KEM for key exchange and ML-DSA for digital signatures.
- Hybrid Approach: During the transition, we use a hybrid implementation that combines the strengths of classical (e.g., RSA, ECC) and post-quantum algorithms. This ensures security against both classical and quantum attacks.
- Crypto-Agility: Our systems are designed to be crypto-agile, allowing us to quickly adapt and update cryptographic algorithms as new standards emerge and the threat landscape evolves.
Data Encryption
We protect your data at every stage:
- Encryption in Transit: All data transmitted between you and our services is encrypted using strong protocols like TLS 1.3, with hybrid key exchange mechanisms to ensure quantum resistance.
- Encryption at Rest: Data stored on our servers is encrypted using industry-standard AES-256 encryption.
Infrastructure Security
Our infrastructure is architected for security and resilience:
- Secure Cloud Environment: We leverage leading cloud providers and adhere to best practices for secure cloud configuration.
- Network Security: We use firewalls, intrusion detection systems, and other network security measures to protect against unauthorized access.
- Regular Penetration Testing: We engage independent security firms to conduct regular penetration tests of our systems to identify and remediate potential vulnerabilities.
Developer Hub
Building secure applications in the quantum era requires the right tools and knowledge. Our Developer Hub provides resources to help you integrate our quantum-safe solutions and build resilient applications.
API Documentation
Explore our comprehensive API documentation to learn how to integrate with Moontrace services. Our APIs are designed to be simple, powerful, and secure.
View API Docs (Coming Soon)Secure Coding Guidelines
Follow our best practices for secure coding to protect your applications from common vulnerabilities. We provide guidance on topics like input validation, authentication, and cryptographic implementation.
Read Development Guides (Coming Soon)Integration Guides
Our integration guides provide step-by-step instructions for incorporating our PQC solutions into your existing applications and workflows, minimizing disruption and accelerating your transition to quantum-safe security.
Explore Integration Paths (Coming Soon)Vendor & Partner Alliances
We hold our vendors and partners to the same high security standards we set for ourselves. A secure supply chain is critical for building a trusted ecosystem.
Vendor Security
All of our vendors undergo a rigorous security review process before we engage with them. We assess their security posture, compliance certifications, and data protection practices to ensure they meet our requirements.
Partner Program
We collaborate with leading technology companies and security experts to advance the adoption of post-quantum cryptography. Our partner program is designed to foster innovation and build a strong, quantum-resilient ecosystem.
Interested in partnering with us? Contact our partnership team.
How Moontrace Builds Trust
Our solutions are built with security and compliance at their core, helping organizations navigate the complexities of the post-quantum transition while adhering to global standards and mandates.
-
NIST-Aligned Algorithms: Our platform integrates and supports NIST-standardized PQC algorithms, ensuring your cryptographic posture is aligned with recognized global benchmarks.
-
Quantum Risk Assessments: We assist organizations in performing comprehensive quantum risk assessments, identifying vulnerabilities and prioritizing migration efforts to meet regulatory expectations.
-
Cryptographic Agility: Our tools enable phased, hybrid crypto adoption, minimizing disruption and ensuring continuous compliance as new standards emerge.
Have more questions? Contact us for more detailed security and compliance information.