Compliance

The runtime your CISO will sign off on.

Regulated buyers do not run agents on an open-source Python library. BrowserAnvil ships with the attestations, audit trails, and data-residency controls your security review asks for — on day one.

Attestations

The certificates your security team will ask for.

Active

SOC 2 Type II

Annual audit covering security, availability, and confidentiality. Report available under NDA.

Active

HIPAA

BAA available on Enterprise. PHI stays in dedicated, region-pinned microVM pools.

Active

ISO 27001

Certified information security management system, audited by a Big-Four firm.

In progress

FedRAMP Moderate

Targeting authorization in 2026. IL2 available today through our GovCloud region.

Data handling

Your data. Your region. Your retention.

Customers pick a region at account creation — US, EU, UK, Canada, or Australia — and session data never leaves it. Enterprise customers can pin individual sessions to a specific zone.

Replays can be encrypted with your own KMS key, mirrored to your S3 bucket, and purged after a retention window you control.

  • AES-256 at rest, TLS 1.3 in transit
  • Customer-managed KMS keys (BYOK) on Enterprise
  • Region pinning at the account and session level
  • Configurable replay retention from 7 days to 7 years
  • Immutable audit logs with tamper-evident hash chain
  • DPA, BAA, and GDPR-compliant SCCs available
Regulated by design

Built for workloads that come with auditors.

Banking & fintech

SOX-ready audit trails on every session. Reconcile an agent action against a regulator request in minutes.

Healthcare

HIPAA-eligible runtime. PHI auto-redacted in replays. Patient-record workflows kept inside your region.

Government

US GovCloud region, IL2 controls, and US-person-only operations on request for federal customers.

Insurance

Claims automation with full chain-of-custody replay for every decision the agent makes.

Pharma & clinical

21 CFR Part 11-aligned audit trails for validated, GxP-adjacent workloads.

Critical infrastructure

Dedicated pools and US-citizen-only engineering ops available on request.

Audit logs you can point at

Every agent action, signed and sequenced.

Our audit log is append-only and hash-chained. Tampering is detectable by recomputing the chain. Events stream into your SIEM over webhook, syslog, or S3 delivery.

{
  "ts": "2026-04-24T14:02:11.318Z",
  "session_id": "sess_2f7a9c",
  "actor": "agent:billing-bot",
  "action": "fill_credential",
  "resource": "acme-okta.password",
  "outcome": "ok",
  "prev_hash": "sha256:8a1c...",
  "hash":      "sha256:f401..."
}
Our security program

The program behind the paperwork.

Least privilege

Production access is broker-gated, time-bounded, and logged. No standing admin.

Continuous pen-testing

Third-party red team engagements twice a year; rolling bug bounty year-round.

Vendor review

Every subprocessor reviewed annually. Full list published at compliance.browseranvil.com.

Incident drills

Quarterly game days. Incident response plan tested against realistic scenarios.

We closed our security review in nine days. Past vendors took over two months. The SOC 2 packet was complete on the first send.

— Dr. Anitha Kovacs, CISO, Helm Health

Security packet

What you get when you ask.

SOC 2 Type II report

Most recent audit period, delivered under NDA in your procurement portal.

Pen-test summary

High-level findings and remediation status from our most recent third-party engagement.

Architecture diagram

Data flow and trust boundaries your security team can annotate.

Subprocessor list

Every vendor with access to customer data, kept current on a public page.

DPA & BAA

Pre-signed templates or redline in DocuSign. EU SCCs included.

Shared responsibility matrix

Clear map of what we own vs. what you own. No ambiguity for the auditor.

Compliance FAQ

Can we use BrowserAnvil for PHI?

Yes, on Enterprise with a signed BAA. HIPAA-eligible regions are isolated from general traffic.

Where is data stored?

In the region you pick at account creation. Replays, audit logs, and vault entries never cross that boundary.

Do you support BYO-KMS?

Yes, on Enterprise. Bring an AWS KMS or GCP KMS key; we use it to wrap session artifacts and vaulted credentials.

How do you handle subpoenas?

We notify the customer before disclosing anything, unless legally prohibited. Our transparency report is published annually.

Security review packet in one click.

SOC 2 report, pen-test summary, subprocessor list, DPA, and architecture diagram.

Request the packet Enterprise features