Compliance Certifications
Truefoundry maintains multiple compliance certifications to meet enterprise security and regulatory requirements:- SOC 2 Type II: Certified for security, availability, processing integrity, confidentiality, and privacy
- GDPR: Compliant with the General Data Protection Regulation for data privacy
- HIPAA: Compliant with Health Insurance Portability and Accountability Act for healthcare data



Our Compliance Certifications
Compliance certifications apply to Truefoundry’s managed infrastructure. For
self-hosted deployments, compliance depends on your infrastructure and
security controls.
Data Security
- Self-Hosted Deployment
- Managed Deployment
Data Residency and Sovereignty
If you are self-hosting the control-plane, Truefoundry’s architecture ensures that your data remains under your control:- Data Stays in Your Environment: When deployed on your infrastructure, all data, models, and artifacts remain within your cloud account or on-premises environment
- No Data Egress: Deploying on your own infrastructure eliminates data egress costs and ensures data never leaves your environment
Emails of the users logging into the Truefoundry platform
Emails of the users logging into the Truefoundry platform
Truefoundry control-plane uses our remote authentication server to
authenticate the users logging into the Truefoundry platform. If you have
added SSO, this will be a chained authentication flow where in the user is
validated by Truefoundry and your IdP both. To read more on this, please refer
to our SSO documentation.
Usage analytics
Usage analytics
The control-plane communicates with our central analytics server (https://analytics.truefoundry.com) and exchanges the following information:
- The number of clusters connected to the control-plane
- The addons installed in each of the clusters along with their versions
- The version of the control-plane
- The number of requests flowing through the gateway (Will be enabled in future)
Public Pricing of instance types and models
Public Pricing of instance types and models
The control-plane communicates with our central catalogue server
(https://catalogue.truefoundry.com) to get the public pricing of the instance
types of AWS/GCP/Azure that are shown on the Truefoundry dashboard. We also
fetch the public pricing of the LLM models that are added to the AI Gateway.
Crash and Error Logs
Crash and Error Logs
Truefoundry uses Sentry to collect crash and error logs from the control-plane
and send it to Sentry’s servers. This helps us identify and fix issues
quickly.
Encryption
- Encryption at Rest: Encrypted at rest using AES-256 encryption
- Encryption in Transit: All network communications use TLS 1.2 or higher to encrypt data in transit
- Secret Management: Integration with cloud-native secret managers (AWS Secrets Manager, Azure Key Vault, GCP Secret Manager) for secure credential storage
Access Control and Authentication
Authentication Methods
Authentication Methods
Truefoundry supports multiple authentication mechanisms:
- Single Sign-On (SSO): Integrate with your identity provider (IdP) including SAML 2.0 and OIDC-compatible providers like Google, Microsoft Entra ID, Keycloak, Okta, etc. Learn more about our SSO documentation.
- JWT Token Authentication: API access using JWT tokens from your identity provider
- API Keys: Secure API key-based authentication for programmatic access
- Token Rotation: Truefoundry supports automated token rotation for the API keys and tokens used to authenticate with the Truefoundry platform. Learn more about our Token Rotation documentation.
Authorization and Access Control
Authorization and Access Control
Infrastructure Security
Architecture Security
Architecture Security
Truefoundry’s split-plane architecture provides security through separation, ensuring sensitive data and workloads remain under your control:Data Never Leaves Your Environment
- The compute plane runs entirely within your Kubernetes cluster (EKS, GKE, AKS, OpenShift, or on-premises). Truefoundry does not provide or access compute resources directly—all workloads execute in your controlled environment
- Your models, datasets, and artifacts stay within your cloud account or on-premises infrastructure, eliminating data egress risks
- The computeplane load balancer can be put behing a private endpoint limiting all external access to the compute plane.
- The compute plane doesn’t require any ingress from the control-plane. Its the compute plane that intiates the connection to the control-plane. The
tfy-agentconnects to the control plane via outbound-only secure WebSocket connections, meaning no inbound ports need to be opened in your firewall - ControlPlane can be selfhosted within your VPC in our enterprise plan.
Network Security
Network Security
- Private Network Deployment: Deploy control plane within your VPC for complete network isolation
- TLS/SSL Encryption: All API communications encrypted with TLS 1.2+
- Firewall Integration: Compatible with your existing firewall and network security policies
- VPC Isolation: Support for deployment within private VPCs and on-premises networks
Container Security
Container Security
- Image Scanning: Integration with container registries and security scanning tools
- Least Privilege: Containers run with minimal required permissions
- Security Contexts: Kubernetes security contexts for pod-level security controls
- Secret Injection: Secure environment variable and secret management without exposing credentials
Truefoundry internally follows a policy to scan all images and artifacts and not release software with any critical known vulnerabilities that have a fix. We have an SLA to fix all critical vulnerabilities within 10 days if a fix is available.
Audit and Monitoring
Audit Logging
Audit Logging
Comprehensive audit logging tracks all platform activities:
- Complete Activity History: All user actions, resource changes, and API calls are logged
- Detailed Audit Trails: Track who performed what action, when, and on which resource
- Export Capabilities: Export audit logs to your logging platform (Splunk, Datadog, etc.)
- API Access: Programmatic access to audit logs via Truefoundry API
Security Monitoring
Security Monitoring
- Self-Hosted Deployment
- Managed Deployment
Since the infrastructure is self-hosted, all your existing monitoring,
alerting and security solutions can be used to monitor the Truefoundry
infrastructure.
AI Gateway Security
Gateway Security Features
Truefoundry’s AI Gateway provides enterprise-grade security for LLM access:- Authentication: Multiple authentication methods including OIDC, JWT, and API keys
- Authorization: Role-based access control for models and endpoints
- Guardrails Integration: Support for content safety, PII detection, and prompt injection prevention
- Request/Response Logging: Secure logging of API requests and responses for compliance and debugging
Content Safety
Integration with enterprise guardrail providers:- Content Filtering: Azure AI Content Safety, OpenAI Moderation, and custom guardrails
- PII Detection and Redaction: Automatic detection and redaction of personally identifiable information
- Prompt Injection Prevention: Protection against prompt injection attacks
- Toxicity Detection: Real-time detection of harmful or inappropriate content
Incident Response and Business Continuity
High Availability
High Availability
- Globally Distributed: Gateway deployed across 12+ regions and multiple cloud providers including AWS, GCP and Azure.
- Automated Failover: Automatic routing to healthy regions in case of regional downtime
- Multi-Cloud Multi-region deployment of control-plane: Control-Plane is deployed across three regions and three cloud providers in active passive mode and has disaster recovery enabled.
- Redundancy: High availability configurations for critical components
Disaster Recovery
Disaster Recovery
Truefoundry is deployed in multiple-regions and multiple-cloud providers. The control-plane is deployed in active passive mode and has disaster recovery enabled.
Status Monitoring
Status Monitoring
Status of all truefoundry hosted components can be tracked at status.truefoundry.com.
You can also subscribe to the status updates by clicking on the “Get Updates” button in the top right corner of the status page.

Backup and Recovery
Backup and Recovery
- Configuration Backups: Regular backups of platform configuration and metadata
- Disaster Recovery: Comprehensive disaster recovery procedures
- Data Backup: Integration with your backup solutions for data plane storage
- Recovery Procedures: Documented procedures for rapid recovery from incidents
Security Reporting
Vulnerability Reporting
Vulnerability Reporting
If you discover a security vulnerability, please report it responsibly:
- Security Contact: Report vulnerabilities to security@truefoundry.com
- Responsible Disclosure: We follow responsible disclosure practices
- Response Time: We aim to respond to security reports within 48 hours
Security Updates
Security Updates
- Security Advisories: Published on trust.truefoundry.com
- Release Notes: Security updates included in platform release notes
- Notifications: Security-critical updates communicated to customers
Data Privacy
Privacy Controls
Privacy Controls
- Data Minimization: Only collect and process data necessary for platform operation
- User Data Control: Users can manage their own data and access permissions
- Data Retention: Configurable data retention policies
- Right to Deletion: Support for data deletion requests in compliance with privacy regulations
GDPR Compliance
GDPR Compliance
Truefoundry is GDPR compliant and provides:
- Data Subject Rights: Support for data access, rectification, and deletion requests
- Privacy by Design: Privacy considerations built into platform architecture
- Data Processing Agreements: Standard data processing agreements available
- Privacy Policy: Comprehensive privacy policy available on our website
Third-Party Security
Vendor Security
Vendor Security
- Security Assessments: Regular security assessments of third-party vendors and integrations
- Secure Integrations: All integrations use secure authentication and encryption
- Vendor Monitoring: Continuous monitoring of vendor security practices
Integration Security
Integration Security
- OAuth 2.0: Secure OAuth-based integrations with cloud providers
- API Security: All API integrations use secure authentication methods
- Credential Management: Secure storage and rotation of third-party credentials
Security Best Practices - Recommendations for Customers
- Enable SSO: Use single sign-on with your identity provider for centralized authentication
- Implement Least Privilege: Grant users only the minimum permissions required for their role
- Regular Access Reviews: Periodically review and audit user access and permissions
- Enable Audit Logging: Monitor audit logs regularly for suspicious activities
- Use Secret Management: Store sensitive credentials in secret managers, not in code
- Network Segmentation: Deploy Truefoundry in isolated network segments when possible
- Regular Updates: Keep Truefoundry components updated to the latest versions
- Enable Guardrails: Use content safety guardrails for AI Gateway deployments
Security is a shared responsibility. While Truefoundry provides secure
infrastructure and platform features, customers are responsible for securing
their applications, data, and access controls within their environment.