Security & Trust
Engineering document AI
built for IT security review
IEC 62443-aligned. ISO/IEC 27001 and SOC 2 Type II in flight. BYOK from Azure Key Vault, AWS KMS, HashiCorp Vault. Sovereign cloud across Azure UAE North, AWS Riyadh, Azure India Central, Azure Singapore, AWS Frankfurt EU. Air-Gapped Customer-Managed for sanctions-restricted and classified workloads. Designed to clear Aramco, ADNOC, and Indian PSU procurement security reviews on first submission.
Need the security review package? Email security@pathnovo.com or request via the demo form.
Standards Alignment
IEC 62443 (industrial cybersecurity) aligned by architecture. ISO/IEC 27001 certification in flight, target Q4 2026. SOC 2 Type II audit in flight, target H1 2027. NIST 800-53 + NIST CSF v2.0 mapped controls. Pathnovo deployments running on Azure and AWS inherit those clouds' existing FedRAMP, IRAP, C5, ENS High, IL5, ISMAP, and TX-RAMP attestations where applicable.
Customer-Managed Keys (BYOK)
Bring your own key from Azure Key Vault, AWS KMS, HashiCorp Vault, or Google Cloud KMS. All extraction artefacts, structured output, embeddings, and logs are encrypted with customer-controlled keys. Key revocation is immediate and irreversible: revoke the key and Pathnovo's access to your data terminates within the next request cycle. For sanctions-sensitive and classified deployments this is the standard configuration.
Encryption Everywhere
TLS 1.3 in transit on every API endpoint, every cross-tenant link, and every backup replication channel. AES-256 at rest on every storage tier, including primary database, blob storage, queue messages, snapshots, backups, and audit logs. Application-level field encryption on identifiers tied to customer drawings, tags, and PO numbers. Zero-knowledge processing for BYOK tenants where Pathnovo never holds the unwrapped key material.
Five Deployment Postures
Cloud SaaS (default, ~95% of customers), Customer-Managed Cloud (BYOC into your Azure or AWS tenant), Sovereign Region Deployment (region-locked storage and processing), Air-Gapped Customer-Managed (Azure Stack Hub or AWS Outposts), and Hybrid Deployment (sovereign processing + Pathnovo SaaS for management tooling). Each posture is documented with a separate Pathnovo Trust Profile that maps to your IT security review framework.
Configurable Data Residency
Azure UAE North (Aramco / ADNOC ecosystem). AWS Middle East (Bahrain) and AWS Riyadh. Azure India Central (Indian PSU + EPC compliance). Azure Singapore + AWS Singapore (SE Asia EPC). AWS Frankfurt EU (European GDPR scope). Azure West Europe / Azure East US for global default. Data residency is selected at deployment, audited at each region rotation, and cannot be silently changed by Pathnovo.
Network Architecture
Private VNet / VPC isolation per tenant. Customer-supplied VNet peering or PrivateLink endpoints for BYOC. No internet egress on air-gapped customer-managed deployments. Dedicated private endpoints for Azure Key Vault, AWS KMS, blob storage, queue, and database. WAF + DDoS protection on all internet-facing endpoints. SOC-grade monitoring with SIEM integration into your enterprise security operations centre on request.
Honest, current state. Where Pathnovo is fully attested today (cloud inheritance) and where attestation is in flight (ISO 27001, SOC 2 Type II). The in-flight evidence package is available under NDA today.
ISO/IEC 27001
Information Security Management System scope covers Pathnovo's full engineering document AI platform: extraction services, customer data plane, control plane, key management integration, and customer-facing APIs. ISMS implementation is complete; external audit is in execution. Customers requiring ISO 27001 attestation today can request the in-progress Statement of Applicability and audit timeline under NDA.
SOC 2 Type II
Trust Services Criteria covered: Security, Availability, Confidentiality, Processing Integrity. Six-month observation window in execution. Customers requiring SOC 2 attestation today can request the SOC 2 readiness report and the in-progress controls evidence package under NDA.
IEC 62443
Pathnovo's architecture is mapped against IEC 62443-3-3 system security requirements and IEC 62443-4-2 component security requirements. Pathnovo is positioned as a Zone Conduit-aligned application that can be deployed inside customer Industrial Automation and Control System (IACS) zones for owner-operators with IEC 62443-graded plant cybersecurity programmes.
GDPR + India DPDPA + UAE PDPL + KSA PDPL
Pathnovo signs Data Processing Agreements aligned to GDPR Article 28, India DPDPA 2023, UAE PDPL Federal Decree-Law 45/2021, and KSA PDPL. EU data is region-locked to AWS Frankfurt or Azure West Europe. Indian data is region-locked to Azure India Central. UAE data to Azure UAE North. KSA data to AWS Riyadh.
Cloud Inheritance
Cloud-hosted Pathnovo deployments inherit Microsoft Azure's and AWS's existing FedRAMP High, IRAP, C5, ENS High, IL5, ISMAP, TX-RAMP, and PCI-DSS attestations where applicable to the deployment region. Customers can request the Azure Trust Centre or AWS Artifact attestation evidence directly from those cloud providers; Pathnovo deploys inside the attested envelope.
Aramco IT Security + ADNOC IT Security + Indian PSU IT Security
Pathnovo has run pre-engagement IT security reviews for Aramco-tier, ADNOC-tier, and Indian PSU-tier customers. Standard deliverables include: penetration test summary (latest test by an independent third-party assessor), data flow diagram, threat model, key management architecture, business continuity / disaster recovery plan, sub-processor list, and incident response playbook. Available under NDA on request.
Customer Data Boundaries
Customer engineering documents and extracted structured data are tenant-isolated at the storage, queue, and database layer. No cross-customer training, no cross-customer model fine-tuning, no cross-customer feature reuse. Pathnovo's extraction models are trained on Pathnovo-licensed and Pathnovo-synthesised engineering training corpora; customer data is never used to improve Pathnovo's general models without explicit, separately-signed customer consent.
Retention + Deletion
Customer-controlled retention: configure document retention from 24 hours (extract-and-discard) to 7 years (compliance archival) per project. End-of-engagement deletion is contractually guaranteed within 30 days of contract termination, with cryptographic erasure for BYOK tenants (key revocation completes deletion in seconds). Audit log retention is independently configurable from primary data retention.
Sub-Processors
Pathnovo's sub-processor list is published, versioned, and notified to customers under DPA Article 28(2)(b). Default sub-processors: Microsoft Azure (compute / storage / KMS), Amazon Web Services (compute / storage / KMS where AWS-deployed), HashiCorp (Vault for BYOK on customer request). Customer veto on sub-processor changes is contractually supported with 30-day notice.
Logging + Audit Trail
Every read, write, extract, export, and admin action is logged with cryptographically-signed timestamps, retained per customer policy, and exportable to your SIEM via syslog, Azure Sentinel connector, AWS CloudTrail integration, or generic webhook. Audit logs are immutable, tamper-evident, and stored separately from primary data with independent retention and encryption keys.
Penetration Testing + Vulnerability Management
Independent third-party penetration testing executed annually with scope covering external attack surface, authenticated tenant boundary, BYOK key handling, and admin plane. Continuous vulnerability scanning across application stack, infrastructure as code, container images, and dependencies. SLA-driven remediation: critical CVE patched within 24 hours of disclosure, high within 7 days, medium within 30 days.
Incident Response
Documented Incident Response Playbook with 24/7 on-call rotation. Customer notification SLA: 24 hours for confirmed personal-data breach (GDPR / DPDPA / PDPL aligned), 72 hours for confirmed security incident affecting customer data, 7 days for contained incidents that did not affect customer data. Post-incident review delivered to affected customers within 14 days with remediation plan.
Is Pathnovo SOC 2 / ISO 27001 certified today?
ISO/IEC 27001 certification audit is in execution with target attestation Q4 2026. SOC 2 Type II audit is in execution with target report H1 2027. Pathnovo's architecture is IEC 62443-aligned today and inherits Azure / AWS attestations (FedRAMP, IRAP, C5, ENS High, IL5, ISMAP, TX-RAMP) where applicable. Customers requiring formal attestation today can request the in-progress Statement of Applicability, controls evidence package, third-party penetration test summary, and SOC 2 readiness report under NDA. For procurement teams running IT security reviews, Pathnovo's documented controls package is sufficient evidence in most owner-operator and EPC vendor onboarding processes today.
Can I bring my own encryption key (BYOK)?
Yes. BYOK is supported from Azure Key Vault, AWS KMS, HashiCorp Vault, and Google Cloud KMS. All customer engineering documents, extracted structured output, embeddings, and audit logs are encrypted with the customer-controlled key. Pathnovo's encryption-at-rest and encryption-in-transit architecture is designed so that key revocation immediately and irreversibly terminates Pathnovo's access to customer data: revoke the key, and the next request cycle returns access-denied. For sanctions-sensitive and classified workloads BYOK is the standard configuration. For mainstream cloud SaaS customers BYOK is opt-in and adds zero functional friction.
Where can my data physically reside?
Configurable at deployment to: Azure UAE North (Aramco / ADNOC ecosystem), AWS Middle East (Bahrain), AWS Riyadh (KSA in-Kingdom), Azure India Central (Indian PSU + EPC compliance), Azure Singapore + AWS Singapore (SE Asia), AWS Frankfurt EU (GDPR scope), or Azure West Europe / Azure East US for global default. Data residency is region-locked at deployment, cannot be silently changed by Pathnovo, and is audited per region rotation. For customers requiring deeper guarantees, the Customer-Managed Cloud (BYOC) and Sovereign Region Deployment options pin data inside your own subscription within the chosen region.
Do you support air-gapped deployment?
Yes, for genuine air-gapped requirements. Pathnovo deploys inside the customer's Azure Stack Hub or AWS Outposts environment with no internet egress, no telemetry, and no auto-updates outside customer-controlled patch windows. This is appropriate for defense-adjacent oil and gas, sanctions-restricted operators (Iran / Iraq / Russia / Cuba scope), and classified facilities. For the other ~95% of EPC and owner-operator buyers, Sovereign Region Deployment with BYOK delivers equivalent practical security without the hardware appliance footprint. See /solutions/deployment-options for the full deployment posture comparison.
Will Pathnovo train its models on my engineering data?
No, not without explicit separately-signed customer consent. Pathnovo's extraction models are trained on Pathnovo-licensed and Pathnovo-synthesised engineering training corpora. Customer documents, customer extraction outputs, and customer feedback are tenant-isolated and are not used to improve Pathnovo's general-purpose models. Customers who want to opt-in to model improvement (typically in exchange for accuracy benefits on their specific document corpus) sign a separate Model Improvement Addendum that defines scope, retention, anonymisation, and opt-out. Default behaviour is no training, no fine-tuning, no cross-tenant feature reuse.
How does Pathnovo handle vulnerability disclosure?
Pathnovo runs a coordinated vulnerability disclosure programme. Reports go to security@pathnovo.com with PGP-signed encryption supported. Acknowledgement within 24 hours, triage within 72 hours, and remediation per severity SLA: critical CVE patched within 24 hours, high within 7 days, medium within 30 days. Independent third-party penetration testing is executed annually with summary report available to customers under NDA. Continuous vulnerability scanning is run across application stack, infrastructure as code, container images, and dependencies.
What happens if I want to leave Pathnovo?
Customer data export is contractually supported in machine-readable formats: CFIHOS 2.0, ISO 15926 RDF, JSON-LD, structured CSV, and the original document files. Export is on-demand at any time during the contract and at end of contract. Post-termination deletion is contractually guaranteed within 30 days, with cryptographic erasure for BYOK tenants (immediate via key revocation). Pathnovo signs a contractually-binding deletion attestation at end of engagement, certified by Pathnovo's Chief Technology Officer. There is no vendor lock-in, no proprietary export format dependency, and no rebuild cost.
Does Pathnovo have a published sub-processor list?
Yes. The sub-processor list is published, versioned, and notified to customers under DPA Article 28(2)(b). Default sub-processors are Microsoft Azure (compute, storage, key management), Amazon Web Services (compute, storage, key management for AWS-deployed customers), and HashiCorp (Vault for BYOK on customer request). Customers receive 30-day advance notice of any sub-processor change with a contractual veto right. The list is available on request and is included by default in DPAs signed under Pathnovo's standard procurement framework.
Can Pathnovo pass an Aramco / ADNOC / Indian PSU IT security review?
Yes. Pathnovo has run pre-engagement IT security reviews for Aramco-tier, ADNOC-tier, and Indian PSU-tier customer evaluations. The standard package includes: penetration test summary, threat model, data flow diagram, key management architecture, business continuity / disaster recovery plan, sub-processor list, incident response playbook, ISMS Statement of Applicability (in flight to ISO 27001), and SOC 2 readiness report (in flight to SOC 2 Type II). All deliverables are available under NDA on request and are pre-aligned to Saudi Aramco IT Security policy SAES-Z-001 series, ADNOC Group IT Security framework, and Indian PSU + DPDPA-aligned IT review patterns.
How is Pathnovo different from Levian-style hardware appliances on security?
Levian-style hardware appliances deliver air-gap by default through physical hardware shipment + on-prem deployment + hardware capex + multi-year maintenance contracts. For genuinely classified workloads (~5% of EPC + owner-operator buyers) this is the right architecture. For the other 95%, Pathnovo's Sovereign Region Deployment + BYOK + Customer-Managed Cloud delivers equivalent practical security guarantees through cloud architecture rather than hardware shipment, at materially lower 3-year total cost of ownership (typically 40-60% less). For defense-adjacent or sanctions-restricted buyers requiring genuine air-gap, Pathnovo's Air-Gapped Customer-Managed deployment matches Levian's security envelope without the hardware footprint. See /compare/pathnovo-vs-levian for the head-to-head security and TCO comparison.
Pillar
Deployment Options
Cloud SaaS, BYOC, Sovereign Region, Air-Gapped Customer-Managed, Hybrid: full deployment posture detail.
Learn more
Compare
Pathnovo vs Levian
Sovereign cloud + BYOK vs hardware appliance: side-by-side security and TCO comparison.
Learn more
Compliance
Indian EPC Compliance Bundle
IBR + OISD 118 + PESO + CCOE compliance overlay built on top of Pathnovo's secure platform.
Learn more
Region
Pathnovo for UAE / Middle East
Azure UAE North + AWS Riyadh data residency for Aramco, ADNOC, QatarEnergy ecosystem.
Learn more
Region
Pathnovo for India
Azure India Central data residency for Indian PSU + EPC compliance.
Learn more
Integration
EPCPROMAN
Indian PSU EPC integration with rate-card commercial fit and IT security review pre-alignment.
Learn more
Integration
AVEVA Connect
AVEVA AIM ingestion through Pathnovo's CFIHOS-native extraction with the same security envelope.
Learn more
Integration
Hexagon HxGN SDx
Hexagon AIM ingestion with the same BYOK + sovereign deployment options.
Learn more
Pillar
Tag-Document Register
Live with McDermott. Bidirectional asset register with the same security architecture.
Learn more
Pillar
Mill Certificate Traceability
180,000+ mill cert formats handled inside the same secure tenant boundary.
Learn more
See what your documents actually contain.
Send us 10 documents from your current project. We extract, reconcile, and show you exactly what we find in 48 hours, before any contract.
If the accuracy isn't what we promised, you owe us nothing.
