Skip to main content
TRSENThe Product: Daqiq

Security

Security posture.

Residency, tokenization, compliance mapping, identity, audit, and incident response. Every control below points to a mechanism in the product or a clause in the DPA. The DPA Cross-Border Annex carries the same claims at audit grade.

§1

Data residency.

Every byte of your carrier data — policy documents, claim evidence, adjudication traces, invoices, audit entries — is stored in Saudi Arabia (Dammam). Database, object storage, vault, worker state, admin console: all in-region.

The exception is frontier-LLM inference routed outside Saudi Arabia. Text-only agent prompts pass through the privacy gateway first; document classification and extraction currently send evidence PDFs to Gemini and are logged as cross-border transfers while in-Kingdom OCR/redaction is the Phase-2 upgrade.

§2

Tokenization.

For text inference routed through the privacy gateway, national IDs, Najm case numbers, phone numbers, IBANs, and policy-holder names are replaced with format-preserving opaque tokens. PDF-native classification and extraction are not yet pre-tokenized.

The token-to-plaintext vault lives in an in-Kingdom database; the KMS keyring currently lives in the EU with an opt-in migration path to a KSA-based HSM under the Portfolio tier. Every vault access — read or write — appends an audit row naming the actor, the claim, and the purpose.

§3

Compliance framework mapping.

Every SAMA CSF, NCA ECC-2, and PDPL control has a named mechanism in the product. The mapping is compact; the DPA annex expands each row into the control text and the evidence path.

FrameworkControlMechanism
SAMA CSF3.2.5 · Data classificationPer-tenant classification registry seeded from the NDMO 5-level model, enforced at every cross-border transfer.
SAMA CSF4.1 · Cryptographic key managementCustomer DEKs wrapped by GCP KMS; per-tenant rotation cadence; break-glass path documented.
SAMA CSF6.2 · Third-party riskLLM-provider enterprise agreements; processor registry on the DPA annex.
NCA ECC-22-3-3 · Secure software developmentChange control on every deploy; production access gated by on-call rotation; admin audit log via database triggers.
NCA ECC-22-12 · CryptographyTLS 1.3 everywhere; at-rest AES-256; KMS-backed envelope encryption for the PII vault.
PDPLArticle 6 · Lawful basisDocumented per-tenant under the Data Processing Agreement; carrier is controller, Daqiq is processor.
PDPLArticle 26 · Data breach notificationCarrier notified inside 48 hours of confirmed impact; NDMO notified inside 72 hours.
PDPLArticle 36 · Data subject rightsIn-product DSR portal returns export, rectification, or deletion within 30 days.

§4

Identity, access, audit.

Sessions use JWT-backed cookies with database-side revocation. Seven roles carry distinct write permissions: nizam_admin, nizam_ops, carrier_admin, carrier_ops, carrier_reviewer, carrier_underwriter, viewer. The matrix is printed in the DPA.

Staff impersonation is read-only. Every impersonated session renders a banner to the operator and writes an audit row the carrier can inspect. Admin audit entries are append-only via database triggers; each row carries actor email, action, target, request ID, hashed IP, and user agent.

§5

Incident response.

Incidents classify into three severities. Sev 1 (carrier-impacting outage or confirmed data exposure) acks in 15 minutes; Sev 2 (partial-impact) in one hour; Sev 3 (low) in four business hours.

Confirmed impact triggers notification to the affected carrier within 48 hours and NDMO within 72 hours per PDPL Article 26. A post-mortem is delivered within 15 business days, with timeline, root cause, control gap, and remediation commitments.

§6

Roadmap.

What isn't shipped yet, and when it will ship.

  • SOC 2 Type II — Q4 2026.
  • ISO 27001 — concurrent with SOC 2.
  • Responsible-disclosure + bug bounty program — Q3 2026.
  • Customer-held CMEK (carrier brings KMS keys) — available as a Portfolio-tier opt-in once reserved capacity is provisioned.
  • KSA-based HSM for the tokenization keyring — Phase-2 product upgrade.

Roadmap commitments.

  • SOC 2 Type II — Q4 2026.
  • ISO 27001 — concurrent with SOC 2.
  • Responsible-disclosure + bug bounty program — Q3 2026.
  • Customer-held CMEK (carrier brings KMS keys) — available as a Portfolio-tier opt-in once reserved capacity is provisioned.
  • KSA-based HSM for the tokenization keyring — Phase-2 product upgrade.