Skip to main content

ISO 27001 Alignment

Compliance status: The controls described below are implemented in the production codebase. SOC 2 Type I audit engagement is underway — report expected Q3 2026. For NDA-gated security documentation, contact hello@creatorlayer.eu.

Creatorlayer's security controls are designed with ISO/IEC 27001:2022 as a reference framework. Formal certification has not been initiated. This page documents current alignment with the standard's Annex A controls.

Certification Status

Formal ISO 27001 certification has not been initiated. Lender customers requiring current control evidence can request the security documentation package.


Security Controls Scope

The Creatorlayer security controls cover:

  • The creatorlayer-api production environment (Scalingo SAS, France)
  • All personal data processing activities (GDPR-subject data)
  • Development and deployment pipelines (GitHub Actions)
  • Third-party sub-processor relationships

Annex A Control Coverage

A.5 — Organizational Controls

ControlImplementationStatus
A.5.1 Policies for information securitySecurity policy documentedDesigned (not yet operational)
A.5.2 Information security rolesSecurity and data protection responsibilities are held by the founderDesigned (not yet operational)
A.5.9 Inventory of assetsData classification policy (4 tiers); schema under migration controlDesigned (not yet operational)
A.5.10 Acceptable use of assetsEnforced via RBAC and API key scopingImplemented in code
A.5.19 Information security in supplier relationshipsSub-processors subject to their standard terms; 30-day change noticeDesigned (not yet operational)
A.5.23 Information security for cloud servicesScalingo SAS; EU data residencyDesigned (not yet operational)

A.6 — People Controls

ControlImplementationStatus
A.6.8 Information security event reportingDocumented incident reporting procedure; 24-hour notification SLADesigned (not yet operational)

A.7 — Physical Controls

ControlImplementationStatus
A.7.1–A.7.6 Physical securityDelegated to Scalingo SAS (ISO 27001 certified data centre in France)Implemented in code

A.8 — Technological Controls

ControlImplementationStatus
A.8.2 Privileged access rightsRBAC with three roles (lender, gdpr_admin, admin); least privilegeImplemented in code
A.8.3 Information access restrictionAPI key auth; IP allowlist; per-lender rate limitingImplemented in code
A.8.4 Access to source codeGitHub repository access controls; branch protectionImplemented in code
A.8.5 Secure authenticationSHA-256 hashed API keys; magic-link creator authImplemented in code
A.8.7 Protection against malwareDependency scanning (npm audit); Semgrep SASTImplemented in code
A.8.8 Management of technical vulnerabilitiesCritical CVEs ≤ 7 days; High CVEs ≤ 30 daysImplemented in code
A.8.12 Data leakage prevention10 KB request limit; CSP headers; no data in logsImplemented in code
A.8.15 LoggingImmutable audit_logs table; 7-year retentionImplemented in code
A.8.16 Monitoring activitiesUptime monitoring; abuse detection middlewareImplemented in code
A.8.24 Use of cryptographyTLS 1.2+ in transit; AES-256 at rest (Scalingo managed)Implemented in code
A.8.25 Secure development lifecycleSAST on every PR; TypeScript strict mode; Zod validationImplemented in code
A.8.28 Secure codingOWASP Top 10 controls; parameterised queries; input validationImplemented in code
A.8.29 Security testingPenetration testing annually (planned)Designed (not yet operational)
A.8.32 Change managementPull request review; migration-controlled schema; CI/CD pipelineImplemented in code
A.8.33 Test informationProduction data never used in tests; isolated test environmentImplemented in code
A.8.34 Protection of information systems during audit testingRead-only audit access; no production impactDesigned (not yet operational)

Gap Analysis Summary

The following controls are in progress or planned:

ControlGapTarget Completion
A.5.5 Contact with authoritiesFormal procedure for CNIL/ANSSI notificationTBD
A.5.6 Contact with special interest groupsISAC membershipTBD
A.8.29 Security testingFormal annual pen test engagementTBD

Certification Roadmap

Formal certification has not been initiated. The following milestones are aspirational and will be updated when an auditor is engaged.

MilestoneTarget
Engage certification bodyTBD
Stage 1 audit (documentation review)TBD
Stage 2 audit (implementation review)TBD
Certificate issuanceTBD

Requesting Documentation

Lender customers requiring ISO 27001-aligned security documentation for their own supplier due diligence process can request:

  • Information Security Policy
  • Risk Assessment Summary
  • Sub-processor list with DPA references
  • Business Continuity Plan summary
  • Audit log retention and access policy

Email: hello@satoshiframework.com Subject: ISO 27001 Documentation Request — [Your Company Name]