TRUST CENTER
Trust snapshot2026-03-21

Security posture, deployment readiness, and public trust artifacts without false certification claims.

This page is the public trust snapshot for Verixos as of March 21, 2026. It is intended to help engineering, procurement, IT, and security teams distinguish between artifacts that are public today, items that are shared during enterprise review, and certifications that are not yet issued. Solver credibility evidence is linked where relevant, but this page is primarily about security, controls, deployment posture, and review readiness.

1
Public artifacts
3
Controlled-access capabilities
1
Formal attestations pending issuance
PUBLIC STATUS

Solver Verification & Validation

Published analytical benchmarks, SAE 961452 parity work, and a documented PharmaSat flight-heritage reproduction chain.

Public
Public Status

Publicly available today

Evidence

Open validation page with benchmark methods, residuals, references, and limitations.

Primary Audience

Engineering and procurement teams

View artifact

SOC 2 Type II Report

Public report is not issued as of March 21, 2026. Security controls and evidence automation were completed ahead of formal audit.

Planned
Public Status

Not yet issued

Evidence

Roadmap target: formal operational evidence window during April 2026 through October 2026, then auditor-issued report.

Primary Audience

Enterprise security reviewers

ITAR / Restricted Program Framework

US-only data residency controls, export gating, and restricted-access workflows are part of the enterprise deployment posture.

Controlled Access
Public Status

Available during customer review

Evidence

Policy packet, access-control design, and deployment scoping shared during procurement.

Primary Audience

Government and defense programs

GovCloud Deployment Path

Deployment architecture, isolation model, and delivery path are prepared for customer-specific environments.

Controlled Access
Public Status

Architecture packet available on request

Evidence

IaC specification, isolation model, and deployment readiness checklist.

Primary Audience

Government and enterprise infrastructure teams

On-Premise / Air-Gapped Deployment

Docker and Kubernetes packaging, license controls, and self-hosted update posture are implemented for secured environments.

Controlled Access
Public Status

Available during solution design

Evidence

Deployment package, licensing controls, and self-hosted operational guidance.

Primary Audience

Enterprise platform and security teams

CONTROL DOMAINS

Identity & Access

Least-privilege access, MFA requirements for admins, and auditable account controls.

Implemented
  • Administrative MFA requirement
  • Role-scoped access control
  • Failed-login tracking and lockout support
  • Audit trail for sensitive actions

Encryption & Residency

Encrypted transport, encrypted storage, and deployment paths for US-only residency requirements.

Implemented
  • TLS 1.3 in transit
  • AES-256 at rest
  • US-only deployment posture for restricted workloads
  • Data export restriction hooks for controlled programs

Change Management

Versioned simulation artifacts, regression APIs, and reproducible run snapshots for engineering review.

Implemented
  • Simulation run input snapshots
  • Thermal regression reporting
  • Version history for model changes
  • Traceable export and report generation

Vulnerability Operations

Dependency scanning, patch workflows, and perimeter protections are part of the hardening baseline.

Implemented
  • Automated dependency review hooks
  • Cloud perimeter protections
  • Documented patching workflow
  • Operational security monitoring baseline

Formal Attestation

Auditor-issued certification artifacts follow the formal audit window; they are not claimed before issuance.

Planned
  • SOC 2 Type II report publication after issuance
  • Customer trust packet updates after report delivery
  • Procurement-facing trust center refresh on issuance
PROCUREMENT NOTE

Trust posture is published separately from solver credibility.

Security posture and engineering validity solve different review problems. Verixos publishes validation evidence openly, keeps deployment-specific packets available for enterprise review, and reserves formal certification claims for auditor-issued artifacts only.