Regulated buyers do not run agents on an open-source Python library. BrowserAnvil ships with the attestations, audit trails, and data-residency controls your security review asks for — on day one.
Annual audit covering security, availability, and confidentiality. Report available under NDA.
BAA available on Enterprise. PHI stays in dedicated, region-pinned microVM pools.
Certified information security management system, audited by a Big-Four firm.
Targeting authorization in 2026. IL2 available today through our GovCloud region.
Customers pick a region at account creation — US, EU, UK, Canada, or Australia — and session data never leaves it. Enterprise customers can pin individual sessions to a specific zone.
Replays can be encrypted with your own KMS key, mirrored to your S3 bucket, and purged after a retention window you control.
SOX-ready audit trails on every session. Reconcile an agent action against a regulator request in minutes.
HIPAA-eligible runtime. PHI auto-redacted in replays. Patient-record workflows kept inside your region.
US GovCloud region, IL2 controls, and US-person-only operations on request for federal customers.
Claims automation with full chain-of-custody replay for every decision the agent makes.
21 CFR Part 11-aligned audit trails for validated, GxP-adjacent workloads.
Dedicated pools and US-citizen-only engineering ops available on request.
Our audit log is append-only and hash-chained. Tampering is detectable by recomputing the chain. Events stream into your SIEM over webhook, syslog, or S3 delivery.
{
"ts": "2026-04-24T14:02:11.318Z",
"session_id": "sess_2f7a9c",
"actor": "agent:billing-bot",
"action": "fill_credential",
"resource": "acme-okta.password",
"outcome": "ok",
"prev_hash": "sha256:8a1c...",
"hash": "sha256:f401..."
}
Production access is broker-gated, time-bounded, and logged. No standing admin.
Third-party red team engagements twice a year; rolling bug bounty year-round.
Every subprocessor reviewed annually. Full list published at compliance.browseranvil.com.
Quarterly game days. Incident response plan tested against realistic scenarios.
We closed our security review in nine days. Past vendors took over two months. The SOC 2 packet was complete on the first send.
Most recent audit period, delivered under NDA in your procurement portal.
High-level findings and remediation status from our most recent third-party engagement.
Data flow and trust boundaries your security team can annotate.
Every vendor with access to customer data, kept current on a public page.
Pre-signed templates or redline in DocuSign. EU SCCs included.
Clear map of what we own vs. what you own. No ambiguity for the auditor.
Yes, on Enterprise with a signed BAA. HIPAA-eligible regions are isolated from general traffic.
In the region you pick at account creation. Replays, audit logs, and vault entries never cross that boundary.
Yes, on Enterprise. Bring an AWS KMS or GCP KMS key; we use it to wrap session artifacts and vaulted credentials.
We notify the customer before disclosing anything, unless legally prohibited. Our transparency report is published annually.
SOC 2 report, pen-test summary, subprocessor list, DPA, and architecture diagram.