ATStatus
ATStatus WikiLoading documentation...

Compliance & Certifications

ATStatus is built with enterprise compliance requirements in mind. Learn about our security posture, regulatory alignment, and compliance-ready features.

Compliance Readiness vs. Certification: ATStatus provides the technical controls and features needed for compliance. Actual certification depends on your organization's implementation, policies, and third-party audits.

Implemented Security Controls

Access Control (A.9)
  • Role-based access control with 4 hierarchical roles
  • 50+ granular permissions
  • Step-up authentication for sensitive operations
  • Two-factor authentication (TOTP)
  • Session management with forced logout capability
Logging & Monitoring (A.12.4)
  • Complete audit trail of all administrative actions
  • Hash-chained logs for tamper evidence
  • IP address and user agent tracking
  • Severity-based event classification
  • Searchable and exportable logs
Cryptography (A.10)
  • SHA-256 password hashing with salting
  • HMAC-signed session tokens
  • API keys hashed before storage
  • CSRF token protection
  • Secure cookie configuration
Operations Security (A.12)
  • Input validation with Zod schemas
  • Rate limiting on API endpoints
  • Parameterized database queries (Prisma ORM)
  • Self-test diagnostics
  • System health monitoring

Self-Hosted Advantage

ATStatus is 100% self-hosted, providing significant compliance benefits:

Data Sovereignty: Your data stays in your infrastructure
No Third-Party Risk: No external SaaS dependencies
Full Control: Complete control over data and encryption
Audit Access: Direct access to all logs for auditors
Important Disclaimer: Compliance certification requires organizational policies, procedures, and third-party audits beyond technical implementation. ATStatus provides the technical foundation — your organization is responsible for the complete compliance program.