ZeroForget AI Security Briefing

Enterprise-grade security. Built for Saudi Arabia.

ZeroForget AI processes sensitive organizational knowledge — strategic documents, code, communications, and personnel data. We treat security not as a feature but as the foundation every other feature is built on.

AWS BahrainPDPL CompliantTenant IsolatedDedicated Encryption
01 / Data Residency

Your data never leaves Saudi Arabia

AWS Bahrain Region

All compute, storage, and database operations run exclusively in the AWS Bahrain region.

PDPL Compliant

Personal Data Protection Law (PDPL) compliance — consent, purpose limitation, and data subject rights enforced by design.

No cross-region replication

Data is never replicated or processed outside Saudi Arabia, even for backups or disaster recovery.

Managed Database

All structured data and search indexes stored in a fully managed database within the AWS Bahrain region.

Cloud Portable by Design

Built from day one to deploy on any major cloud provider — AWS, Azure, GCP, or Oracle Cloud — wherever your organization requires.

02 / Encryption

AES-256 at rest. TLS 1.3 in transit. Your key.

AES-256 Encryption at Rest

Every document is encrypted at rest with AES-256 using managed encryption keys.

Dedicated Encryption Key (Enterprise)

Enterprise workspaces receive a dedicated encryption key. Revoke the key and the data is cryptographically inaccessible — even to us.

TLS 1.3 in transit

All traffic between clients and servers is encrypted with TLS 1.3.

Encrypted Secrets Management

Integration tokens and secrets are stored in encrypted vaults. Never written to databases or application logs.

03 / Tenant Isolation

Complete workspace isolation enforced at the infrastructure level

Infrastructure-Level Isolation

Every data table enforces strict workspace isolation at the infrastructure level. Workspace boundaries cannot be bypassed by application logic.

Read + Write Policies

Separate security policies govern reads and writes. Cross-tenant data access is rejected at the infrastructure level, independent of application logic.

Automatic Context Scoping

Workspace context is set automatically per request and resets after each operation — zero leakage risk between tenants.

Least-Privilege Roles

All operations run under least-privilege credentials. Administrative actions require separate authorization with full audit logging.

04 / Access Control

RBAC, audit log, and workspace approval gate

Role-based access: User / Admin / Owner

Three-tier RBAC enforced across all operations. Every action requires a minimum authorized role.

Workspace approval gate

New workspaces require system admin approval before any user can access the product. No self-service data exposure.

Full audit log

Every create, update, delete, and access event is written to the audit log with actor, workspace, timestamp, and change details.

Team-level source access control

Sources and knowledge bases can be scoped to specific teams. Search results exclude sources the user's team cannot see.

05 / AI Security

Best-in-class AI — your data never leaves your region

Best-in-Class LLMs — Fully Managed

All AI inference runs within your cloud region. No data is sent to third-party services or processed outside your infrastructure boundary.

No model training on your data

Our AI provider does not use your prompts or responses for model training or improvement. Your documents never become training data.

Prompts contain only relevant context

Only the most relevant document excerpts are included in AI prompts. Your full knowledge base is never exposed in a single request.

Dedicated AI Capacity (Enterprise)

Enterprise workspaces receive dedicated AI capacity, fully isolated from other customers.

06 / Data Lifecycle

Full export. Complete deletion. Cryptographic erasure.

Full data export on request

System admins can export all workspace data as a compressed archive via a secure, time-limited download.

PDPL Article 20 — deletion within 30 days

Right-to-deletion removes all records, files, and encryption keys. Completed within 30 days of request.

Staged Encryption Key Revocation

Encryption keys go through staged revocation: immediate disable (reversible), then scheduled deletion with a recovery window before permanent cryptographic erasure.

Revocation Cancellation

Key revocation can be cancelled during the grace period. Once deletion is scheduled, it can still be reversed within the recovery window.

07 / Compliance

Certifications & standards

Compliant

PDPL

Saudi Arabia

In Progress

SOC 2 Type II

In Progress

Compliant

AWS Well-Architected

Cloud Native

Planned

ISO 27001

Planned

08 / Enterprise Q&A

Answers for your security questionnaire

How is our data isolated from other customers?

Strict infrastructure-level isolation enforces workspace boundaries. Every query is scoped to your workspace automatically. Even if application logic contained a bug, the infrastructure would reject cross-tenant access.

Is our data encrypted? Who holds the keys?

Data at rest uses AES-256 encryption with managed keys. Enterprise workspaces receive a dedicated encryption key. You can revoke the key at any time, making data cryptographically inaccessible. Staged revocation provides a recovery window before permanent erasure.

Can you delete all of our data if we leave?

Yes. Full deletion under PDPL Article 20 removes all records, files, and encryption keys. Completed within 30 days. A data export is available before deletion.

Where is our data stored? Does it leave Saudi Arabia?

All data is stored and processed in AWS Bahrain. No cross-region replication. AI inference runs entirely within the same cloud region — no data is sent to any third-party service.

Does the AI learn from our data?

No. Our AI provider does not use your prompts or responses for model training. Your documents never become training data for any AI model.