Security
Enterprise-grade controls for public verification.
OBAM provides the controls legal, security, and compliance teams expect when public customer references become part of a governed workflow.
Security overview
OBAM is designed for teams that need governed external references backed by operational controls and accountable access patterns.
Tenant isolation
Tenant-aware policies constrain access to references, assets, and audit events so each organization remains logically isolated.
Tokenized workflows
Verification and action workflows rely on scoped, expiring tokens with explicit status transitions and revocation support.
Audit and logging
Critical actions are logged to provide traceability for authorizations, updates, expiry policy changes, and revocation events.
Data handling
Data is encrypted in transit and at rest with controlled key access paths and documented operational handling standards.
Compliance posture
OBAM supports GDPR commitments and provides supporting documentation for enterprise legal and security review processes.
Need detailed security materials?
We can share architecture, controls, and policy documentation during formal review.
View DPA summaryRequest security package
Start a security and compliance review aligned with your procurement process.
Request security packageReview materials available
Public materials for initial security and procurement review
- Security architecture overview and product control boundaries.
- Controls summary for access, lifecycle governance, and audit visibility.
- Data Processing Addendum summary at /legal/dpa.
- Public subprocessor list and processing roles at /legal/subprocessors.
- Verification workflow and schema behavior documentation at /docs.
Trust evidence path
