BenchmarksStack RankingAPIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
ISO 27001 SOC 2 HIPAA

Media Inventory Logs

Effective: March 17, 2026 · DCF-388 · ISO 27001 A.5.9 / A.7.10

1. Purpose

This document maintains a complete inventory of all information assets and media used by H33.ai, Inc. in accordance with ISO 27001:2022 control A.5.9 (Inventory of information and other associated assets) and A.7.10 (Storage media). This inventory supports SOC 2 Trust Services Criteria and HIPAA Security Rule requirements for asset management (45 CFR §164.310(d)(1)).

H33.ai operates a fully cloud-based, remote-first infrastructure. No physical removable media (USB drives, external hard drives, optical discs, backup tapes) is used to store, process, or transmit sensitive data, customer data, or protected health information (PHI/ePHI). All information assets are cloud-hosted.

2. Inventory Summary

Total Physical Media 0 — None
Total Cloud/Digital Assets 27 registered
Removable Media Permitted Prohibited
Last Full Review March 17, 2026
Next Scheduled Review June 2026 (quarterly)
Inventory Owner Eric Beans, CEO/CISO

3. Cloud Infrastructure Assets

Production compute, storage, and database resources hosted on Amazon Web Services (AWS).

Asset IDAsset NameTypeClassificationLocationCustodianStatus
AWS-001H33 Production API (c8g.metal-48xl)ComputeConfidentialAWS us-east-1Eric BeansActive
AWS-002RDS PostgreSQL (z101-postgres-prod)DatabaseConfidentialAWS us-east-1Eric BeansActive
AWS-003ElastiCache Redis (l100-redis-prod)CacheConfidentialAWS us-east-1Eric BeansActive
AWS-004Auth1 Elastic Beanstalk (z101-auth-prod)ApplicationConfidentialAWS us-east-1Eric BeansActive
AWS-005CloudFront CDN DistributionCDNPublicAWS GlobalEric BeansActive
AWS-006S3 Buckets (logs, backups, artifacts)StorageConfidentialAWS us-east-1Eric BeansActive
AWS-007AWS Secrets ManagerKey StoreRestrictedAWS us-east-1Eric BeansActive
AWS-008AWS KMS (encryption keys)Key StoreRestrictedAWS us-east-1Eric BeansActive
AWS-009CloudTrail (audit logs)LoggingConfidentialAWS us-east-1Eric BeansActive
AWS-010CloudWatch LogsLoggingConfidentialAWS us-east-1Eric BeansActive
AWS-011ACM TLS CertificatesCertificateInternalAWS us-east-1Eric BeansActive
AWS-012EC2 SSH Key PairsKeyRestrictedAWS us-east-1Eric BeansActive

4. SaaS and Third-Party Service Assets

Cloud services used for development, monitoring, compliance, and business operations.

Asset IDAsset NameTypeClassificationData StoredBAA/DPAStatus
SVC-001GitLab (source control & CI/CD)DevOpsConfidentialSource code, CI configsDPAActive
SVC-002DataDog (monitoring)ObservabilityInternalMetrics, logs, tracesDPAActive
SVC-003Drata (compliance)GRCConfidentialPolicies, evidence, controlsBAA + DPAActive
SVC-004Microsoft 365 (email, docs)ProductivityConfidentialEmail, documentsBAA (HIPAA pkg)Active
SVC-005Netlify (static hosting / CDN)HostingPublicStatic website filesDPAActive
SVC-006Stripe (payments)FinancialRestrictedPayment data (PCI scope)DPAActive
SVC-007Twilio (SMS/OTP)CommunicationsInternalPhone numbers, OTP logsDPAActive

5. Cryptographic Key Assets

Inventory of all cryptographic key material used in H33’s post-quantum authentication pipeline.

Asset IDKey TypeAlgorithmStorageRotationStatus
KEY-001FHE Public/Secret Key PairsBFV (N=4096, 56-bit Q)Process memory (ephemeral)Per sessionActive
KEY-002Dilithium Signing KeysML-DSA (FIPS 204)AWS Secrets ManagerAnnualActive
KEY-003Kyber Key Exchange KeysML-KEM (FIPS 203)Ephemeral (per session)Per sessionActive
KEY-004TLS CertificatesRSA-2048 / ECDSAAWS ACMAuto-renewedActive
KEY-005JWT Signing Keys (Auth1)RS256AWS Secrets ManagerAnnualActive
KEY-006Database Encryption KeysAES-256AWS KMS (RDS managed)AWS managedActive
KEY-007S3 Encryption KeysAES-256 (SSE-S3/SSE-KMS)AWS KMSAWS managedActive
KEY-008SSH Key PairsEd25519IAM / local (encrypted)AnnualActive

6. Endpoint Assets

Employee endpoint devices used to access H33 systems. All endpoints are subject to the Endpoint Security Policy.

Asset IDDevice TypeOwnerDisk EncryptionMDMStatus
EP-001MacBook Pro (development)Eric BeansFileVault (AES-256-XTS)Microsoft Defender for EndpointActive

7. Physical Media Inventory

H33.ai does not use physical removable media for any business purpose involving sensitive data, customer data, or PHI. This section is maintained to provide explicit evidence of compliance.

Media TypeQuantityContains Sensitive DataStatus
USB Flash Drives0N/AProhibited
External Hard Drives0N/AProhibited
Optical Discs (CD/DVD)0N/AProhibited
Backup Tapes0N/AProhibited
Printed Documents (PHI/ePHI)0N/AProhibited
Mobile Devices (company-issued)0N/ANone issued

8. Data Classification Levels

All assets in this inventory are classified according to H33’s Information Classification Policy:

RestrictedCryptographic keys, credentials, secret key material. Access limited to CEO/CISO and automated systems only. Never stored on removable media.
ConfidentialSource code, customer data, PHI/ePHI, authentication logs, database contents. Access controlled by IAM policies and least privilege. Encrypted at rest and in transit.
InternalOperational metrics, monitoring data, non-sensitive communications. Available to authorized workforce members.
PublicWebsite content, documentation, blog posts, marketing materials. No access restrictions.

9. Inventory Management Process

  • New Assets: Any new information asset (cloud service, SaaS subscription, endpoint device, or cryptographic key type) must be registered in this inventory before deployment. The CISO must approve the addition and assign a classification level.
  • Asset Changes: Changes to asset classification, location, or custodian must be documented within 5 business days. Changes are tracked via version history below.
  • Asset Decommissioning: Decommissioned assets are marked as “Decommissioned” with the date and method of secure disposal (e.g., AWS resource deletion, key destruction, secure device wipe).
  • Quarterly Review: The complete inventory is reviewed quarterly by the CISO to verify accuracy, identify unauthorized assets, and confirm classification levels remain appropriate.
  • Automated Discovery: AWS Config and DataDog infrastructure monitoring provide continuous automated discovery of cloud assets. Any unregistered asset triggers an alert for investigation.

10. Media Disposal Records

No physical media disposal has occurred, as H33.ai does not use physical media for sensitive data. Cloud resource disposal is managed through AWS secure deletion procedures with cryptographic erasure.

DateAssetMethodVerified By
No disposal records — no physical media in use

11. Revision History

VersionDateAuthorChanges
1.0March 17, 2026Eric BeansInitial inventory creation. 27 cloud/digital assets registered. Zero physical media. All classifications assigned.

Questions?

Contact the Security Officer at security@h33.ai or the Compliance team at compliance@h33.ai.

H33.ai, Inc. · 11533 Brighton Knoll Loop, Riverview, FL 33579 · 813-464-0945