What SOC 2 requires you to do
• CC6.1 — Logical access — Restrict logical access to data based on roles. Cypherz's per-project keys, API keys, and admin RBAC map cleanly.
• CC6.7 — Data in transit — Cypherz proxy uses TLS 1.3 between you and us, and onward to the AI provider.
• CC7.2 — Logging and monitoring — Every tokenize, detokenize, and proxy call is logged with action type, project, and metadata.
• C1.1 — Confidentiality — Sensitive data tokenized before transit. AES-256-GCM with envelope encryption at rest.