BenchmarksStack RankingAPIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
ISO 27001 SOC 2

ISO Statement of Applicability

Effective: March 17, 2026 · DCF-162

1. Purpose

This Statement of Applicability (SOA) is a mandatory component of the H33.ai Information Security Management System (ISMS) as required by ISO 27001:2022 Clause 6.1.3(d). It identifies all ISO 27001:2022 Annex A controls, states whether each control is applicable to H33.ai's operations, provides justification for any exclusions, and documents the implementation status of each applicable control.

2. Scope

This SOA covers the entire scope of the H33.ai ISMS, which encompasses:

  • The H33 post-quantum cryptographic authentication platform (FHE, ZK-STARK, ML-DSA/Dilithium)
  • Auth1 identity and authentication service (H33 subsidiary)
  • All AWS infrastructure (Graviton4 compute, RDS PostgreSQL, ElastiCache Redis, Elastic Beanstalk)
  • Corporate IT systems (Microsoft 365, GitLab, Drata, DataDog)
  • All personnel, processes, and information assets of H33.ai, Inc.

3. Document Information

Document OwnerEric Beans, CEO/CISO
ClassificationInternal / Audit Evidence
ISMS ScopeH33.ai post-quantum authentication platform and supporting infrastructure
StandardISO/IEC 27001:2022
Total Controls93 (Annex A)
Applicable92
Not Applicable1 (A.8.30)
Implemented92

4. Statement of Applicability — Annex A Controls

The following table lists all 93 controls from ISO 27001:2022 Annex A. For each control: App. = Applicable (Y/N), Impl. = Implemented (Y/N).

ControlTitleApp.Justification / Implementation DetailsImpl.
A.5 — Organizational Controls
A.5.1Policies for information securityYInformation Security Policy published and reviewed annually. Maintained in Drata policy library. Approved by CEO/CISO.Y
A.5.2Information security roles and responsibilitiesYRoles defined: CEO/CISO (Eric Beans) as Security Officer. Responsibilities documented in ISMS role matrix and enforced via Drata personnel tracking.Y
A.5.3Segregation of dutiesYSoD matrix maintained (see DCF-745). Compensating controls in place for small team: Drata continuous monitoring, automated CI/CD controls, GitLab merge request approvals, audit trails.Y
A.5.4Management responsibilitiesYManagement commitment documented. CEO/CISO conducts quarterly ISMS reviews. Security objectives set annually and tracked in Drata.Y
A.5.5Contact with authoritiesYAuthority contact register maintained (see DCF-744). Includes HHS OCR, FBI Cyber, US-CERT/CISA, FTC, Florida AG. Reviewed annually.Y
A.5.6Contact with special interest groupsYActive participation in NIST PQC standardization community, FHE.org, IACR. Monitoring NIST SP 800-208 and FIPS 203/204/205 updates.Y
A.5.7Threat intelligenceYDataDog threat monitoring for infrastructure. AWS GuardDuty enabled. NIST NVD and US-CERT advisories monitored. Post-quantum threat landscape tracked via NIST PQC mailing list.Y
A.5.8Information security in project managementYSecurity requirements integrated into all development projects. Threat modeling performed for new features. Security review gates in GitLab CI/CD pipelines.Y
A.5.9Inventory of information and other associated assetsYAsset inventory maintained in Drata. Covers AWS infrastructure, endpoints, SaaS applications, data stores, cryptographic keys, and code repositories.Y
A.5.10Acceptable use of information and other associated assetsYAcceptable Use Policy published. Covers endpoint usage, SaaS applications, data handling, and corporate communications. All personnel acknowledge upon onboarding.Y
A.5.11Return of assetsYOffboarding procedure includes return/wipe of all company assets. Remote wipe capability via endpoint management. Access revocation within 24 hours of termination.Y
A.5.12Classification of informationYFour-tier classification: Public, Internal, Confidential, Restricted. Cryptographic keys and biometric templates classified as Restricted. Classification guide published.Y
A.5.13Labelling of informationYLabelling requirements defined per classification tier. Documents include classification headers. Automated labelling in Microsoft 365 via sensitivity labels.Y
A.5.14Information transferYAll data in transit encrypted via TLS 1.3 minimum. API communications use Kyber key exchange + AES-256-GCM (post-quantum hybrid). Email secured via Microsoft 365 HIPAA package.Y
A.5.15Access controlYRole-based access control (RBAC) across all systems. AWS IAM least-privilege policies. Auth1 MFA enforced for all administrative access. Access reviews quarterly.Y
A.5.16Identity managementYH33.ai identity platform (own product) with post-quantum FHE biometric authentication. Auth1 for workforce identity. Unique identifiers for all users and service accounts.Y
A.5.17Authentication informationYPasswords meet NIST SP 800-63B requirements (minimum 12 characters). MFA required for all systems. Biometric templates encrypted via BFV FHE (never stored in plaintext). SSH keys rotated quarterly.Y
A.5.18Access rightsYAccess provisioned on need-to-know basis. Quarterly access reviews conducted and documented in Drata. Privileged access requires separate approval. AWS IAM policies enforce least privilege.Y
A.5.19Information security in supplier relationshipsYVendor security assessment performed prior to engagement. Key suppliers: AWS (SOC 2 Type II, ISO 27001), Microsoft (SOC 2, HIPAA BAA), GitLab (SOC 2), Drata (SOC 2), DataDog (SOC 2). BAAs executed with all HIPAA-relevant vendors.Y
A.5.20Addressing information security within supplier agreementsYSecurity requirements included in all vendor contracts. HIPAA Business Associate Agreements in place with AWS, Microsoft 365, and all subprocessors handling PHI. Annual review of supplier compliance.Y
A.5.21Managing information security in the ICT supply chainYSupply chain risk assessed for all third-party dependencies. Rust dependency auditing via cargo-audit. AWS shared responsibility model documented. No hardware manufacturing supply chain (cloud-only).Y
A.5.22Monitoring, review and change management of supplier servicesYSupplier SOC 2 reports reviewed annually. AWS Health Dashboard monitored via DataDog. Vendor risk reassessments triggered by material changes. Drata vendor management module tracks compliance status.Y
A.5.23Information security for use of cloud servicesYAWS cloud security architecture documented. Security groups, NACLs, and VPC configurations reviewed quarterly. CloudTrail enabled for all API activity. AWS Config rules enforce baseline compliance. CloudFront CDN with WAF enabled.Y
A.5.24Information security incident management planning and preparationYIncident Response Plan documented and tested. Roles defined (CEO/CISO as Incident Commander). Runbooks for common scenarios. Communication templates prepared. Contact authorities register maintained (DCF-744).Y
A.5.25Assessment and decision on information security eventsYEvent classification criteria defined (severity levels 1-4). DataDog alerting with automated triage. Security events logged and correlated. Escalation thresholds documented.Y
A.5.26Response to information security incidentsYIncident response procedures documented: containment, eradication, recovery, lessons learned. HIPAA breach notification procedures included (60-day HHS notification). Forensic evidence preservation procedures in place.Y
A.5.27Learning from information security incidentsYPost-incident review (PIR) required for all Severity 1-2 incidents. Root cause analysis documented. Corrective actions tracked in Drata. Lessons learned shared and incorporated into updated procedures.Y
A.5.28Collection of evidenceYEvidence collection procedures documented. AWS CloudTrail, VPC Flow Logs, and application logs preserved. Chain of custody procedures defined. Log retention minimum 1 year (6 years for HIPAA).Y
A.5.29Information security during disruptionYBusiness Continuity Plan addresses security during disruption. AWS multi-AZ deployment ensures availability. RDS automated backups with point-in-time recovery. Security controls maintained during failover scenarios.Y
A.5.30ICT readiness for business continuityYRecovery Time Objective (RTO): 4 hours. Recovery Point Objective (RPO): 1 hour. AWS infrastructure supports rapid recovery. RDS automated backups (35-day retention). ElastiCache Redis replication. Disaster recovery tested annually.Y
A.5.31Legal, statutory, regulatory and contractual requirementsYCompliance register maintained: HIPAA, SOC 2 Type II, ISO 27001, Florida breach notification statute (FS 501.171), NIST SP 800-171. Regulatory monitoring via Drata. Legal counsel reviews annually.Y
A.5.32Intellectual property rightsYAll source code owned by H33.ai, Inc. Open-source license compliance tracked. Employee IP assignment agreements executed. Patent-pending post-quantum cryptographic methods documented.Y
A.5.33Protection of recordsYRecords management policy defines retention schedules. HIPAA records retained 6 years. Audit logs retained 1 year minimum. Records protected from unauthorized access, modification, and destruction. AWS S3 versioning and MFA delete enabled.Y
A.5.34Privacy and protection of PIIYPrivacy policy published. HIPAA Privacy Rule compliance enforced. Biometric data encrypted via FHE (never decrypted at rest). Data minimization practiced. Privacy impact assessments performed for new processing activities.Y
A.5.35Independent review of information securityYAnnual SOC 2 Type II audit by independent CPA firm. ISO 27001 certification audit planned. Drata continuous monitoring provides independent control validation. Internal audits per DCF-165.Y
A.5.36Compliance with policies, rules and standardsYDrata continuously monitors compliance with internal policies. Quarterly policy compliance reviews. Non-compliance tracked via nonconformity management process (DCF-566). Automated evidence collection reduces manual gaps.Y
A.5.37Documented operating proceduresYOperating procedures documented for: deployment (Elastic Beanstalk), monitoring (DataDog), backup/recovery (RDS), incident response, access management, change management. Stored in GitLab and Drata.Y
A.6 — People Controls
A.6.1ScreeningYBackground checks performed on all personnel prior to employment. Verification of identity, employment history, and criminal record. Proportional to data classification access level.Y
A.6.2Terms and conditions of employmentYEmployment agreements include: confidentiality obligations, acceptable use requirements, security responsibilities, IP assignment, termination obligations. Reviewed and signed at onboarding.Y
A.6.3Information security awareness, education and trainingYAnnual security awareness training required for all personnel. HIPAA-specific training completed annually. Role-specific training for development and operations. Training completion tracked in Drata.Y
A.6.4Disciplinary processYDisciplinary process documented for security policy violations. Progressive discipline: verbal warning, written warning, suspension, termination. Severity-based response for intentional violations.Y
A.6.5Responsibilities after termination or change of employmentYPost-employment obligations defined in employment agreements. Confidentiality survives termination. Exit interviews cover security obligations. Non-compete and non-solicitation as applicable.Y
A.6.6Confidentiality or non-disclosure agreementsYNDAs required for all employees, contractors, and third parties with access to confidential information. Covers proprietary cryptographic algorithms, customer data, and business information. Annual review.Y
A.6.7Remote workingYFully remote workforce. Remote work security policy enforced: encrypted endpoints (FileVault/BitLocker), VPN for administrative access, secure home network requirements, approved device policy. Endpoint compliance monitored via Drata agent.Y
A.6.8Information security event reportingYAll personnel required to report security events immediately to security@h33.ai. Reporting procedures documented in Security Awareness Training. Anonymous reporting option available. No retaliation policy for good-faith reports.Y
A.7 — Physical Controls
A.7.1Physical security perimetersYFully remote workforce; no corporate office. Physical security perimeters managed by AWS for data center infrastructure (SOC 2 Type II certified facilities). Remote work environments secured per remote work policy.Y
A.7.2Physical entryYFully remote workforce; physical security managed via AWS data centers and endpoint security policies. AWS data centers enforce multi-factor physical access controls, biometric verification, and 24/7 security staffing.Y
A.7.3Securing offices, rooms and facilitiesYFully remote workforce; physical security managed via AWS data centers and endpoint security policies. Home office security guidelines provided to all remote workers.Y
A.7.4Physical security monitoringYFully remote workforce; physical security managed via AWS data centers and endpoint security policies. AWS facilities have CCTV, intrusion detection, and 24/7 security monitoring. DataDog monitors infrastructure health.Y
A.7.5Protecting against physical and environmental threatsYFully remote workforce; physical security managed via AWS data centers and endpoint security policies. AWS data centers designed for fire suppression, flood protection, seismic resilience, and redundant power/cooling.Y
A.7.6Working in secure areasYFully remote workforce; physical security managed via AWS data centers and endpoint security policies. Remote workers advised on secure workspace practices (screen privacy, clean desk, locked devices).Y
A.7.7Clear desk and clear screenYClear desk and clear screen policy published. Auto-lock configured (5 minutes). Sensitive information not to be left visible. Enforced through security awareness training and endpoint configuration.Y
A.7.8Equipment siting and protectionYFully remote workforce; physical security managed via AWS data centers and endpoint security policies. Endpoint devices must use full-disk encryption. Mobile device management enforced.Y
A.7.9Security of assets off-premisesYAll company endpoints encrypted (FileVault/BitLocker). Remote wipe capability. VPN required for administrative access. Asset tracking maintained in Drata inventory.Y
A.7.10Storage mediaYRemovable media policy restricts use. Cloud-first data storage (AWS S3, RDS). Media sanitization procedures follow NIST SP 800-88. Encrypted storage required for any local data.Y
A.7.11Supporting utilitiesYFully remote workforce; physical security managed via AWS data centers and endpoint security policies. AWS provides redundant power, UPS, and generator backup. Remote workers advised on UPS for critical devices.Y
A.7.12Cabling securityYFully remote workforce; physical security managed via AWS data centers and endpoint security policies. AWS manages all data center cabling infrastructure with physical access controls.Y
A.7.13Equipment maintenanceYFully remote workforce; physical security managed via AWS data centers and endpoint security policies. AWS manages all infrastructure maintenance. Endpoint updates managed via OS auto-update policies.Y
A.7.14Secure disposal or re-use of equipmentYEquipment disposal follows NIST SP 800-88 media sanitization guidelines. All drives cryptographically erased before disposal. AWS handles infrastructure decommissioning per their SOC 2 controls.Y
A.8 — Technological Controls
A.8.1User endpoint devicesYEndpoint security policy enforced: full-disk encryption (FileVault/BitLocker), OS auto-update, screen lock (5 min), antivirus/EDR. Endpoint compliance monitored via Drata agent. Approved device list maintained.Y
A.8.2Privileged access rightsYPrivileged access restricted and documented. AWS IAM roles follow least privilege. Root account secured with hardware MFA. Privileged access reviews conducted quarterly. Break-glass procedures documented.Y
A.8.3Information access restrictionYAccess restricted per classification level. AWS IAM policies enforce resource-level permissions. Database access limited to application service accounts. Direct production access requires approval and logging.Y
A.8.4Access to source codeYSource code hosted on GitLab with role-based access. Protected branches require merge request approvals. Repository access audited quarterly. No public repositories for proprietary code.Y
A.8.5Secure authenticationYH33 post-quantum biometric authentication (own product): BFV FHE-encrypted biometric matching, ML-DSA/Dilithium attestation, ZK-STARK proof verification. Auth1 MFA for workforce access. FIDO2/WebAuthn supported. No plaintext credential storage.Y
A.8.6Capacity managementYAWS Auto Scaling configured for production workloads. DataDog monitors CPU, memory, disk, and network utilization. Capacity thresholds trigger automated scaling. Graviton4 metal instances for FHE compute workloads benchmarked at 2.17M auth/sec sustained.Y
A.8.7Protection against malwareYEndpoint protection deployed on all devices. AWS GuardDuty for infrastructure threat detection. Rust-native codebase reduces attack surface (memory safety). cargo-audit for dependency vulnerability scanning in CI/CD.Y
A.8.8Management of technical vulnerabilitiesYVulnerability management program: cargo-audit in CI/CD pipeline, AWS Inspector for infrastructure scanning, DataDog security monitoring. Critical vulnerabilities patched within 72 hours. Monthly vulnerability reviews.Y
A.8.9Configuration managementYInfrastructure as code (Elastic Beanstalk configurations). Baseline configurations documented. AWS Config rules monitor drift. Configuration changes tracked via GitLab version control. Hardening baselines per CIS benchmarks.Y
A.8.10Information deletionYData retention and deletion policies defined per classification and regulatory requirements. HIPAA: 6-year retention. Automated data lifecycle management. Cryptographic erasure for FHE-encrypted data (key destruction).Y
A.8.11Data maskingYBiometric data processed exclusively under FHE encryption (never decrypted server-side). PII masked in logs. Test environments use synthetic data. Database queries return only necessary fields (projection).Y
A.8.12Data leakage preventionYMicrosoft 365 DLP policies configured. GitLab secret scanning enabled. AWS Macie monitors S3 for sensitive data. Egress filtering on production VPC. FHE architecture inherently prevents data leakage (data never decrypted in processing).Y
A.8.13Information backupYRDS PostgreSQL: automated daily backups with 35-day retention, point-in-time recovery enabled. ElastiCache Redis: daily snapshots. S3: versioning and cross-region replication for critical data. Backup restoration tested quarterly.Y
A.8.14Redundancy of information processing facilitiesYAWS multi-AZ deployment for RDS and ElastiCache. Elastic Beanstalk health monitoring with auto-replacement. CloudFront CDN with global edge locations. No single points of failure in production architecture.Y
A.8.15LoggingYComprehensive logging: AWS CloudTrail (API activity), VPC Flow Logs (network), application logs (structured JSON), Auth1 authentication events. Logs shipped to centralized DataDog. Tamper-evident log storage in S3 with object lock.Y
A.8.16Monitoring activitiesYDataDog infrastructure monitoring (CPU, memory, disk, network, application metrics). AWS GuardDuty for threat detection. CloudWatch alarms for operational thresholds. Drata continuous compliance monitoring. 24/7 alerting configured.Y
A.8.17Clock synchronizationYAll AWS instances synchronized via Amazon Time Sync Service (NTP). Chrony configured on EC2 instances. Time source: GPS and atomic clocks via AWS. Log timestamps in UTC. Drift monitoring via DataDog.Y
A.8.18Use of privileged utility programsYPrivileged utility use restricted and logged. SSH access to production requires key-based authentication. Administrative tools limited to authorized personnel. All privileged sessions logged via CloudTrail and session recording.Y
A.8.19Installation of software on operational systemsYSoftware installation on production systems controlled via Elastic Beanstalk deployment pipeline. No manual installations. CI/CD pipeline enforces build reproducibility. Endpoint software installation governed by acceptable use policy.Y
A.8.20Networks securityYAWS VPC with private subnets for databases and application servers. Security groups restrict inbound/outbound traffic. NACLs provide additional network segmentation. VPC Flow Logs enabled. WAF on CloudFront.Y
A.8.21Security of network servicesYAll network services encrypted (TLS 1.3). AWS PrivateLink for inter-service communication where applicable. API Gateway with rate limiting and authentication. DDoS protection via AWS Shield Standard.Y
A.8.22Segregation of networksYProduction, staging, and development environments in separate AWS VPCs. Database subnets isolated (private, no internet gateway). Security groups enforce micro-segmentation. No cross-environment network paths.Y
A.8.23Web filteringYCloudFront WAF rules filter malicious web traffic. Rate limiting on API endpoints. Bot detection enabled. OWASP Top 10 protection rules active. Egress filtering on production instances.Y
A.8.24Use of cryptographyYPost-quantum cryptographic architecture: BFV Fully Homomorphic Encryption (lattice-based, H33-128 security), ML-DSA/Dilithium digital signatures (FIPS 204), ML-KEM/Kyber key exchange (FIPS 203), ZK-STARKs (SHA3-256). AES-256-GCM for symmetric encryption. All cryptographic implementations follow NIST PQC standards. Key management via AWS KMS and application-level key hierarchy. Cryptographic agility designed for algorithm migration.Y
A.8.25Secure development life cycleYSecure SDLC enforced: threat modeling in design, secure coding standards (Rust memory safety), static analysis in CI/CD, dependency scanning (cargo-audit), code review via GitLab merge requests, security testing before deployment.Y
A.8.26Application security requirementsYSecurity requirements defined for all applications. Input validation, output encoding, authentication, authorization, cryptographic controls, error handling, and logging requirements documented. OWASP ASVS Level 2 target.Y
A.8.27Secure system architecture and engineering principlesYZero-trust architecture principles applied. Defense in depth: FHE (data never decrypted), ZK-STARKs (zero-knowledge verification), Dilithium (post-quantum signatures). Microservice isolation. Least privilege. Fail-secure defaults.Y
A.8.28Secure codingYRust programming language for core cryptographic operations (memory safety by design). Secure coding guidelines documented. Code reviews required for all changes. No unsafe Rust blocks without explicit justification and review. SAST integrated in CI/CD.Y
A.8.29Security testing in development and acceptanceYAutomated testing suite: unit tests, integration tests, cryptographic correctness tests (known-answer tests). Criterion benchmarks verify performance invariants. Security regression testing in CI/CD. Acceptance testing before production deployment.Y
A.8.30Outsourced developmentNNot Applicable. All development is performed in-house by H33.ai employees. No outsourced development activities. All source code is authored, reviewed, and maintained internally. Should outsourced development be engaged in the future, this control will be reassessed and appropriate controls implemented.
A.8.31Separation of development, test and production environmentsYSeparate AWS environments: development, staging, production. Each environment has isolated VPCs, separate databases, and distinct IAM roles. No production data in development/test environments (synthetic data used). Deployment promotion via CI/CD pipeline only.Y
A.8.32Change managementYChange management process: GitLab merge requests with required approvals, CI/CD pipeline validation, staging deployment and testing, production deployment via Elastic Beanstalk managed updates. Emergency change procedures documented. All changes logged and auditable.Y
A.8.33Test informationYProduction data not used in test environments. Synthetic biometric templates generated for testing. Test data generation scripts maintained. Data masking applied if production-like data is ever needed for debugging (requires approval).Y
A.8.34Protection of information systems during audit testingYAudit testing performed in controlled manner. Production audit activities scheduled during low-traffic periods. Audit tools and access limited to authorized auditors. Audit evidence collected via Drata automated controls where possible to minimize production impact.Y

5. Summary of Exclusions

A.8.30Outsourced Development — All development is performed in-house. No outsourced development contracts exist or are planned. This exclusion will be reassessed if development activities are outsourced in the future.

6. SOA Revision History

Rev 1.0March 17, 2026 — Initial SOA created for ISO 27001:2022 certification. All 93 Annex A controls assessed. 92 applicable, 1 excluded (A.8.30).

7. Approval

Prepared ByEric Beans, CEO/CISO
Approved ByEric Beans, CEO/CISO
Approval DateMarch 17, 2026
Next ReviewMarch 17, 2027 (or upon material change to ISMS scope)
Signature/s/ Eric Beans

Questions?

Contact the Security Officer at security@h33.ai or the Compliance team at compliance@h33.ai.

H33.ai, Inc. · 11533 Brighton Knoll Loop, Riverview, FL 33579 · 813-464-0945