DropOps Logo

Platform Security

Zero Trust architecture designed for security-conscious organizations requiring human oversight and data sovereignty.

The #1 concern for enterprises evaluating AI solutions is data privacy and security.

According to Google Cloud research, 37% of executives cite security as their top factor when considering AI providers. DropOps addresses this head-on with industry-first security innovations.

Industry-First Security Innovations

shield_lock

Zero Standing Privileges

AI starts with zero permissions. Access granted only through explicit human approval, scoped to specific intents, revocable instantly.

block

Zero Inbound Connectivity

No open ports, no VPN tunnels, no attack surface. Operators initiate only outbound connections.

database

Local-First Data Sovereignty

Sensitive data never persists in the cloud. Full audit trail retained on your infrastructure.

person_check

Mandatory Human-in-the-Loop

All state-changing operations require explicit approval. No autonomous execution.

Security by Intent

DropOps is designed around deliberate human action at every step, creating a chain of intent that makes unauthorized actions structurally impossible.

Every change requires your conscious choice. The AI gathers only the relevant data it is authorized to access in the context of your request, and modifying your systems always requires your explicit approval.

Complete Operator Control

You have multiple independent ways to cancel operations and stop operators.

From the DropOps UI:

From your environment:

No automatic timeouts—long-running operations like terraform apply complete naturally. You decide when to cancel. The operator is just a binary—run it however you prefer (foreground, background, screen/tmux, systemd). It leaves no services, daemons, or open ports when stopped.

Zero Trust Architecture Compliance

DropOps addresses the core Zero Trust principles outlined in NSA/CISA guidance:

"Never Trust, Always Verify"

"Assume Breach"

"Verify Explicitly"

DropOps directly addresses NSA Zero Trust Implementation Guideline (ZIG) Discovery Phase requirements across all five pillars: User, Device, Application & Workload, Data, and Network & Environment.

Zero Inbound Connectivity

The DropOps Operator initiates all connections outbound. No open ports, no firewall rules, no VPN.

# Traditional approach
Internet --[SSH:22]--> Firewall --[VPN]--> Your Server
         Open ports = attack surface

# DropOps approach
Your Server --[outbound only]--> DropOps
            No listening ports. Nothing to attack.

Human-in-the-Loop Execution

All state-changing operations require your explicit approval before execution. This is non-negotiable.

No changes execute on your systems without your explicit approval. Read-only operations proceed automatically so you're only engaged when decisions matter.

Authentication

API Security

All DropOps API endpoints enforce strict identity controls to prevent unauthorized access.

Even if an attacker obtains a valid session, they can only access their own data. Cross-user access is structurally impossible because identity is bound to the session itself.

Session Security

DropOps maintains two independent session types: web sessions for dashboard access and operator sessions for system connections. Both are secured with defense-in-depth controls.

Web Session Security

Operator Session Security

Session Isolation

Scaling Without Approval Fatigue

Managing dozens or hundreds of systems shouldn't mean approving the same command dozens or hundreds of times. When a command needs to run on multiple operators, you see one approval dialog listing all impacted systems—eliminating approval fatigue while maintaining full security visibility.

Defense in Depth: Even if an attacker compromises a session token, they can only access the account that session belongs to. Cross-account access is architecturally impossible—identity is derived from the validated session, never from request parameters.

Data Protection

Data Sovereignty (Local-First Audit Architecture)

DropOps implements a Local-First Audit Architecture (LFAA) where the Operator is the System of Record for all session history, execution logs, and file mutations. The cloud acts as a stateless relay - no sensitive operational data persists in the cloud database.

"The Cloud handles routing. The Operator handles retention." All command output, file contents, and execution history are stored locally on the operator - never transmitted to or stored in the cloud.

LFAA Components

How It Works

Compliance Benefits

Live Transmission Monitor

The Data Sovereignty Dashboard includes a Live Transmission Monitor that provides real-time visibility into exactly what data leaves your operator versus what stays local.

The Live Transmission Monitor proves our data sovereignty claim in real-time. Watch a command execute and see "1024 bytes stayed local" while only "142 bytes (metadata)" goes to cloud.

AI Safety Controls

AI agents execute investigation and response workflows within your predefined guardrails. DropOps enforces these guardrails at multiple levels:

We recommend running the Operator as a standard user. Only start with elevated privileges if your specific task requires it.

AI explaining sudo is blocked for security reasons

Infrastructure Security

Incident Response

We take security incidents seriously and respond promptly.

Business Continuity

DropOps is hosted on Google Cloud Platform with built-in redundancy and backup capabilities.

Capability Description
Infrastructure Google Cloud Platform (GKE) with autoscaling
Database Firestore with automatic replication
Data Residency United States regions

Third-Party Risk Management

We maintain a limited set of vetted subprocessors, each with documented security assessments.

Subprocessor Purpose Data Processed Compliance
Google Cloud Platform Infrastructure hosting All service data SOC 2, ISO 27001, FedRAMP
Stripe Payment processing Payment data only PCI DSS Level 1
Google (Gemini) AI processing Session context SOC 2, ISO 27001

Logging & Monitoring

Vulnerability Management

Network Security Details

Internal Access Controls

Data Classification & Handling

We collect only what is necessary to provide the service.

Data Type Collected Retention
Account information Email, name (from Google OAuth) Until account deletion
Chat history All conversations with the AI Until account deletion
Operator activity Commands, approvals, connection times Until account deletion
Audit logs All actions, approvals, and approver IP addresses Until account deletion
User preferences Workflow preferences (non-specific) Until account deletion

We never store passwords (Google OAuth only) or credit card numbers (Stripe handles all payment data). File contents are not persisted.

Operator Security Hardening

Both the Cloud Operator and DropOps Operator binary are built with security as a priority.

AWS Cloud Operator: Two-Role Architecture

The Cloud Operator implements TRUE least-privilege through separation of concerns. Two distinct IAM roles ensure that the role executing actions cannot grant itself permissions, and the role granting permissions cannot access resources.

🔒 Separation of Concerns: The Operator Role (attached to EC2) executes actions but CANNOT modify any IAM policies. The Escalation Role can grant permissions to the Operator Role but has NO access to AWS resources. This ensures neither role alone can both grant and use permissions.

# DropOps Cloud Operator Two-Role Architecture

OPERATOR ROLE (attached to EC2 instance)
  CAN:  Execute granted intent permissions
        Self-discovery (sts:GetCallerIdentity, iam:Get*)
        Assume Escalation Role for policy grants
  CANNOT: iam:PutRolePolicy, AttachRolePolicy (ANY role)
          iam:CreateRole, PassRole, UpdateAssumeRolePolicy
          (Blocked by permission boundary - hard ceiling)

ESCALATION ROLE (assumed temporarily)
  CAN:  iam:AttachRolePolicy (Operator Role ONLY)
        iam:DetachRolePolicy (Operator Role ONLY)
        (Only Intent-* managed policies)
  CANNOT: ec2:*, s3:*, rds:*, lambda:*, ANY resource access
          (No permissions for any AWS services)

Intent-based escalation flow:
  1. AI: "Should I see EC2 instances?" → You: "Yes"
  2. AI assumes Escalation Role (sts:AssumeRole)
  3. Escalation Role attaches Intent-ec2_discovery to Operator Role
  4. AI returns to Operator Role, executes ec2:Describe*
Cloud Operator dynamic intent-based permissions flow

Auto-Approved Self-Discovery

Cloud Operators can check their own IAM identity and permissions without requiring your approval. These read-only commands (such as aws sts get-caller-identity and aws iam get-role-policy) help the AI understand what it can do before asking you for additional access.

The Operator can only access what you explicitly authorize through conversation. No pre-configured access to your AWS resources.

Build & Release Pipeline

Our release process includes security checks:

Security Testing

We perform internal security testing on releases.

Compliance & Regulatory Alignment

DropOps implements security controls aligned with industry frameworks and regulatory requirements. Formal certifications are planned as the platform scales.

Framework Alignment
NIST SP 800-207 Zero Trust Architecture - Full alignment
NIST SP 800-53 Security Controls - Controls implemented
CIS Controls Center for Internet Security - Controls implemented
ISO 27001 Information Security - Alignment in progress
SOC 2 Type II Controls implemented; certification in progress
GDPR Data protection requirements - Controls implemented
HIPAA Healthcare data safeguards - Controls implemented
FedRAMP Government compliance - Architecture aligned
CMMC Defense industry standards - Architecture aligned

Note: We do not currently hold formal certifications. We are implementing the controls required by these frameworks and plan to pursue certification as we grow.

lock TLS 1.3
verified_user NSA/CISA ZT Aligned
military_tech Veteran-Owned (VOSB)
shield Zero Trust Architecture

Healthcare & Government Considerations

Healthcare Data Protection (HIPAA)

Government Security Requirements

The Local-First Audit Architecture ensures that sensitive operational data never leaves your infrastructure, meeting the strictest data residency requirements for healthcare and government environments.

Enterprise Security Information

For enterprise customers evaluating DropOps, we can provide additional security documentation:

Security Inquiries

security@dropops.ai

Vulnerability reports, enterprise security documentation, SBOM requests, security questionnaire completion.

Compliance Documentation

compliance@dropops.ai

SOC 2 reports, HIPAA BAA requests, FedRAMP documentation, regulatory alignment inquiries.

Architecture Boundaries

Transparency means being clear about boundaries. DropOps enforces these architectural constraints:

Your Data Rights

Responsible Disclosure

Report Security Issues

security@dropops.ai

Include reproduction steps. We acknowledge within 48 hours and provide resolution timeline within 5 business days.