Security, compliance, and evidence verification resources for procurement, security, and diligence teams.
Enterprise-grade security controls designed for regulated financial services.
What this means: In COMPLIANCE mode, locked object versions cannot be overwritten or deleted by any user (including root) until retention expiry. This is an AWS S3 Object Lock COMPLIANCE mode guarantee.
How to verify: Auditors can confirm WORM retention via AWS Console → S3 → Bucket → Properties → Object Lock, or via aws s3api get-object-retention.
Clear data processing, storage, and residency commitments.
| Deployment Model | Data Processed | Data Stored | Operated By | Retention Default |
|---|---|---|---|---|
| SaaS (Multi-Tenant) | Party names, identifiers, screening requests | Decision receipts, evidence artefacts, audit logs | QuantumVerify | 7 years (configurable) |
| VPC / PrivateLink | Same as SaaS | Customer's AWS account (S3 buckets) | Customer infra, QV software | Customer-defined |
| On-Premises | Same as SaaS | Customer's infrastructure | Customer | Customer-defined |
Default deployment region is eu-west-2 (London). All data processing and storage occurs within the EU unless explicitly configured otherwise. Additional regions available on request for enterprise deployments.
QuantumVerify does not store raw transaction data, payment card numbers (PAN), or bank account details. We process screening requests and store only the decision evidence required for audit compliance.
Platform capabilities mapped to regulatory frameworks and industry standards. Mapping shows which evidence artefacts support your controls; it is not a statement of legal compliance or certification.
Mapped controls + evidence outputs for EU Regulation 2022/2554:
Supports your DORA compliance case; not a compliance certification.
Supports workflows aligned to MiCA:
Supports your MiCA/CASP compliance case.
Mapped controls for EU Regulation 2024/886 (VoP):
Supports your IPR compliance case.
FATF Recommendation 16 alignment:
Not controls mapping available — control mapping and evidence available
Information Security Management:
No third-party certification is claimed unless explicitly provided under NDA.
Not a SOC 2 report — alignment artefacts available
Trust Services Criteria:
SOC 2 is an examination report over controls, not a certification; QuantumVerify provides a controls mapping pack to accelerate your assessment. AICPA SOC 2 framework →
Procurement-ready security documentation for vendor assessment.
Full subprocessor list available on request for procurement review.
Targets (subject to contract/SLA)
Vulnerability Disclosure: Security researchers can report vulnerabilities to lukasz.dziewiecki@quantumverify.io. We acknowledge within 48 hours and coordinate disclosure timelines.
Pen-test executive summary and vulnerability scan reports available under NDA.
DPA: Data Processing Addendum available under NDA; includes subprocessor list, retention terms, deletion certificates.
In SaaS and VPC deployments, customers are responsible for:
Accelerate your procurement and security review process.
Pre-completed artefacts to accelerate your security review:
Available on request; gated for qualified prospects.
Pre-completed responses for common security questionnaires:
Typical response time: 3–5 business days for standard questionnaires.
To request any pack, contact lukasz.dziewiecki@quantumverify.io or use the form below.
For diligence teams requiring detailed security documentation, control mappings, or questionnaire responses.
Request Access → View UAT Evidence →