Enterprise Security

Military-Grade Security.
Zero Supply Chain Risk.

Absolute DB implements every layer of security natively — no OpenSSL, no external TLS libraries, no third-party cryptographic dependencies. Your data is protected by code we wrote and control completely.

0
External crypto deps
3
FIPS PQC algorithms
5
Compliance frameworks
136
Security tests — all pass
Encryption

Data protected at every layer

From data at rest on disk to data in transit across the network, every byte is encrypted with algorithms we implemented in pure C11 — no third-party cryptographic library touches your data.

🔒

Encryption at Rest

AES-256-GCM column-level encryption with hardware-backed key management. Every sensitive column is encrypted independently with a unique data-encryption key. Compromising one column's key exposes nothing else.

🔐

Encryption in Transit

Native TLS 1.3 with no external TLS libraries — we implemented TLS ourselves, eliminating third-party cryptographic supply chain risk entirely. Supports both AES-256-GCM and ChaCha20-Poly1305 cipher suites. SNI, ALPN, and session resumption all included.

⚛️

Post-Quantum Ready

First-class post-quantum cryptography under FIPS 203/204/205: ML-KEM-768 key encapsulation, ML-DSA-65 digital signatures, SLH-DSA hash-based signatures. Hybrid classical + post-quantum key exchange for TLS connections — future-proof today.

Access Control

Layered identity & authorisation

Multiple access-control models stack on top of each other, so you can start simple and add sophistication without rearchitecting.

🛡️

Role-Based Access Control (RBAC)

Fine-grained permissions at database, schema, table, and column level. Grant and revoke with standard SQL GRANT / REVOKE statements. Works natively with every PostgreSQL-compatible ORM and driver.

🎯

Attribute-Based Access Control (ABAC)

Policy-driven access based on user attributes and resource properties. Enforce rules like "analysts can only read data tagged for their cost centre" without custom application logic.

🔎

Row-Level Security (RLS)

Per-row access policies — users see only the rows they're authorised to see. Defined once in the database, enforced on every query path, invisible to application code.

🎭

Dynamic Data Masking

Sensitive fields — PAN, SSN, PHI, email addresses — automatically masked based on user role. Production data stays safe in lower environments without ETL pipelines or application changes.

🔑

Single Sign-On (SSO)

JWT-based SSO integration with configurable session expiry. Users authenticate once through your identity provider; Absolute DB validates tokens on every connection — no password sync required.

🗝️

Hardware Key Management

Enterprise tier includes a FIPS 140-3 Level 4 HSM path for hardware-backed key operations. Data-encryption keys never leave the HSM boundary in plaintext.

Zero-Trust Networking

Every connection verified. Every time.

Enterprise tier

The Enterprise tier ships a full zero-trust networking stack. Trust is never implied by network location — every peer must prove its identity on every operation.

🤝 Mutual TLS (mTLS)

Every connection requires client certificate verification — no anonymous connections are accepted. Certificates are issued, rotated, and revoked automatically without downtime.

🪪 SPIFFE / SVID Identity

Each database node issues X.509 SVIDs per the SPIFFE standard; peer identity is verified cryptographically on every operation. Works across Kubernetes pods, VMs, and bare-metal nodes in multi-region clusters.

📋 Per-Peer ACLs

Fine-grained access control keyed on client SPIFFE identity — not just role. Restrict which services can write to which tables down to a single microservice identity without touching application code.

🔄 Hot Certificate Rotation

Zero-downtime certificate rotation with post-quantum signed handshakes. Rotate the cluster CA and all leaf certificates in a rolling window — live traffic continues uninterrupted throughout.

Audit & Compliance

Compliance built in, not bolted on

Automated compliance tooling for every major framework. Generate audit reports, evidence packages, and lineage maps in seconds — not audit-week scrambles.

🔗

Hash-Chained Audit Log

Every database event is logged with a SHA-256 hash chain — tamper-evident by construction. WORM mode prevents any retrospective modification. Merkle tree validation lets auditors verify log integrity without reading every entry.

🇪🇺

GDPR (EU 2016/679)

Automated right-to-erasure, Subject Access Reports, consent ledger, and right-to-portability — all via standard SQL calls. Column-level data lineage maps which fields contain personal data across every table and view.

sql
CALL absdb_gdpr_erase('users', 'email', 'alice@example.com');
SELECT * FROM absdb_gdpr_report('alice@example.com');
🏥

HIPAA Technical Safeguards

PHI column tagging with automatic audit trail on every read and write operation. Access reports can be generated for any date range in seconds. Row-level security ensures clinicians see only their patients' records.

sql
ALTER TABLE patients ALTER COLUMN ssn SET (hipaa_phi = true);
SELECT * FROM absdb_hipaa_access_report('2026-01-01', '2026-03-31');
💳

PCI-DSS v4.0

FF3-1 format-preserving tokenisation for PAN data — tokens look like card numbers so downstream systems need no changes. Annual DEK rotation enforced automatically. PAN never stored or logged in plaintext anywhere in the system.

sql
SELECT absdb_pci_tokenise('4111111111111111');
SELECT absdb_pci_detokenise(token); -- role-restricted
📊

SOC 2 Type II

Continuous evidence collection across all five Trust Service Criteria. Generate an auditor-ready evidence package for any date range with a single SQL call. No spreadsheet-gathering required.

sql
SELECT * FROM absdb_soc2_evidence('2026-01-01', '2026-03-31');
📋

ISO 27001:2022

Built-in asset register, control mapping, and automated compliance reporting aligned to Annex A controls. Maintain ISO 27001 certification evidence continuously rather than preparing for annual audits.

sql
SELECT * FROM absdb_iso27001_controls();
Certifications & Standards

Every major compliance framework. Natively.

All compliance tooling is built into the database binary — no third-party agents, no compliance sidecars.

GDPR HIPAA PCI-DSS v4.0 SOC 2 Type II ISO 27001:2022 FIPS 203 (ML-KEM-768) FIPS 204 (ML-DSA-65) FIPS 205 (SLH-DSA) CISA Memory-Safe
Supply Chain Security

Zero npm. Zero source maps. Zero runtime risk.

In March 2026, the developer community was reminded how severely npm-based supply chains can fail. Absolute DB is architecturally immune to this entire class of vulnerability — by design, not by patch.

🚫

No npm. No Node.js. No JavaScript runtime.

Absolute DB is written entirely in pure C11 and compiled to a single ~154 KB native binary. There is no npm package, no node_modules directory, no JavaScript runtime, and no bundler involved at any stage — not in the product, not in the build system, not in the toolchain. npm supply chain attacks simply have no attack surface here.

🗺️

No source maps. No accidental code exposure.

Source map files (.map) are a JavaScript bundler artefact that can accidentally expose full application source code in production packages. Absolute DB has no source maps — ever. A compiled C binary does not produce them. What ships is a stripped native binary. No source reconstruction is possible from the release artefact.

📦

Zero external dependencies in the binary.

The Absolute DB binary links only against libc, libm, libpthread, and libdl — standard system libraries present on every POSIX platform. No OpenSSL. No libcurl. No protobuf-c. No gRPC-c. No liburing. Every protocol, every cryptographic primitive, every I/O path is original C11 code. There is no third-party dependency to be compromised, backdoored, or typosquatted.

🔬

The entire build is auditable in under 7 seconds.

make release builds the complete Absolute DB binary from ~120,000 lines of C11 source in under 7 seconds on a standard workstation. Every line of code that runs in production is visible, reviewable, and reproducible. Security auditors can read the full source, verify every cryptographic implementation against its specification, and reproduce the build independently — no proprietary build system, no binary blobs, no obfuscation.

🏗️ Architectural security — not patched security

Supply chain vulnerabilities in npm-based tools are patched reactively — someone discovers the problem, files a CVE, and a patch is released. Absolute DB's approach is different: the entire class of npm, JavaScript runtime, source map, and bundler vulnerabilities does not exist because the architecture that would enable them was never built. Pure C11 + single binary = a fundamentally smaller and simpler attack surface than any multi-runtime, multi-package-manager toolchain.

FAQ

Security questions answered

Do you use OpenSSL?

No. Absolute DB implements TLS 1.3 natively in pure C11 with no external cryptographic libraries. This eliminates the entire OpenSSL supply chain attack surface — Heartbleed, BEAST, and similar vulnerabilities cannot exist in our TLS implementation because we do not share a single line of code with OpenSSL.

What is post-quantum cryptography and why does it matter?

Quantum computers will break classical public-key cryptography (RSA, elliptic curve) within 10–15 years at scale. FIPS 203, 204, and 205 specify quantum-resistant algorithms standardised by NIST. Absolute DB implements all three natively, future-proofing your data against "harvest now, decrypt later" attacks — where adversaries store encrypted traffic today and decrypt it once quantum hardware matures.

How does column-level encryption work?

Each encrypted column has its own unique data-encryption key (DEK), managed through the built-in key management system or an external HSM (Enterprise tier). Encrypting and decrypting happens transparently at the storage layer — queries run normally, SQL stays the same, and DEKs are rotated without downtime.

How do I report a security vulnerability?

Email security@absolutedb.com with a detailed description of the vulnerability, steps to reproduce, and any proof-of-concept code. We acknowledge within 24 hours and aim to patch confirmed vulnerabilities within 30 days. We do not operate a public bug bounty program at this time but do credit researchers in our release notes with their consent.

Is Absolute DB memory-safe?

Every release must pass AddressSanitizer, UndefinedBehaviorSanitizer, and ThreadSanitizer with zero errors — this is a hard gate on merging to main. Bounds-checked memory references and secure zeroing of sensitive buffers are enforced via mandatory code standards across every security-critical path.

Get in touch

Security questions?

Our security team responds to every inquiry. Whether you're a CISO evaluating Absolute DB for regulated workloads or a researcher with a question about our cryptographic implementation — we'd like to hear from you.