For AI agents: a documentation index is available at the root level at /llms.txt and /llms-full.txt. Append /llms.txt to any URL for a page-level index, or .md for the markdown version of any page.
  • Getting Started
    • Introduction
    • Getting Started
    • Tia — Operations Assistant
    • Architecture
    • Security Architecture
  • Onboarding & Plans
    • Onboarding Overview
    • Plans & Subscriptions
    • Tia Credits
  • Tenancy & Governance
    • Roles & Members
    • Audit Log
    • Notifications
    • Economic Operators
  • Authoring Studios
    • Content Studio
    • Theme Studio
    • Advanced Studio (Track B)
  • Product Module
    • Products
    • Custom Fields
    • Global Search
    • Identifiers
    • Product Import
    • Bulk Editing
    • Bulk Updates
    • Resolver & GS1 Digital Link
    • GS1 Digital Link Contract
  • Localisations
    • Overview
    • Market Packs
    • Multilingual Content
  • Domains & Custom Hostnames
    • Domain Architecture
    • Resolver Domain Flow
    • Custom Hostname Setup
    • DNS Setup Guide
    • Resolver & Passport Rendering
    • Custom Hostname Lifecycle
    • Troubleshooting
  • Passports
    • Overview
    • Passport Operations
    • Lifecycle States
    • Controlled Update & Break-Glass
    • Content & Templates
    • Themes & Presentation
    • Consumer Experience
    • Publication Lifecycle
    • Brand Setup & Readiness
    • Drafts
  • Passport Intelligence
    • Passport Intelligence
    • Intelligence Overview
    • Scan Visibility
    • Trust Signals
    • Engagement Insights
    • Investigation Timelines
    • Data & Privacy
    • Roadmap
  • Minting
    • Overview
    • Lifecycle
    • Architecture
    • Limits & Performance
    • Token Preview
    • Exports & Print Jobs
    • Carrier Output Profiles
    • Bring-Your-Own Serials
    • Security
    • FAQ
  • API Reference
    • API Credentials Guide
    • API: Credentials
    • API: Products
    • API: Identifiers
    • API: Import
    • API: Batches
    • API: Attachments
    • API: Bulk Updates
    • API: Minting
    • API: Resolver
    • API: Search
On this page
  • 1. Uncompromising Supply Chain Security
  • 2. Mathematically Enforced Tenant Isolation
  • 3. Immutable, Tamper-Evident Ledgers
  • 4. Privacy by Design & Edge GDPR Compliance
  • 5. Bank-Grade Encryption & Secret Management
  • 6. Bulletproof API & Edge Infrastructure
  • 7. Deterministic AI Boundaries
  • 8. Open Standards & Interoperability
  • 9. Enterprise Compliance Readiness
Getting Started

Enterprise Security & Trust Architecture

Was this page helpful?
Previous

Onboarding Overview

Next
Built with

1. Uncompromising Supply Chain Security

tieback

is an enterprise-grade platform engineered to manage digital product identities, Digital Product Passports (DPPs), and supply chain trust workflows at a global scale.

Our architecture operates on a Fail-Closed, Zero-Trust paradigm. We assume that networks are hostile, supply chain environments are chaotic, and threat vectors are constantly evolving. tieback is mathematically hardened against cross-tenant data exposure, unauthorized ledger mutations, volumetric edge abuse, and counterfeit scan cloning.

2. Mathematically Enforced Tenant Isolation

We do not rely on fragile application-layer logic to separate customer data.

  • Database-Level Zero-Trust: tieback enforces strict multi-tenancy at the database core using PostgreSQL Row Level Security (RLS). Every query is cryptographically bound to the authenticated brand’s identity at the engine level. It is physically impossible for data to leak across tenant boundaries, bypassing human error entirely.

  • Comprehensive Coverage: Tenant isolation extends across all platform surfaces — products, identifiers, passports, localisations, Market Packs, audit logs, and API credentials. Every data entity is partitioned by brand at the database level.

  • Granular RBAC: Access is governed by the principle of least privilege. Supply chain mutations — like identity minting, passport publication, or localisation changes — require explicit administrative roles, strictly enforced by the database.

  • No Standing Access: tieback engineering operates on a strict “no standing access” policy to production environments. Break-glass interventions require time-bound, cryptographically logged approvals.

3. Immutable, Tamper-Evident Ledgers

Trust requires absolute proof. tieback replaces fragile logging with cryptographic certainty.

  • Append-Only Event Ledgers: All critical supply chain operations — from identity issuance to status revocation — generate immutable records in an append-only ledger.

  • Absolute Provenance: We maintain a flawless “what changed, when, and who changed it” timeline. Every state mutation permanently records the authenticated actor and an unforgeable server-side timestamp.

  • Frictionless Verification: Consumers, auditors, and customs officials can verify product authenticity with a standard smartphone camera. No crypto wallets, seed phrases, or specialized apps are required to interact with our tamper-evident data layer.

4. Privacy by Design & Edge GDPR Compliance

tieback

tracks products, not people.

  • Aggressive Data Minimization: Scanning a tieback Digital Link does not require a user account. Our globally distributed Edge network physically truncates IP addresses before analytics ingestion, ensuring immediate GDPR compliance at the network layer.

  • Partitioned PII: If consumer workflows (such as claiming ownership or warranty registration) are activated, Personally Identifiable Information (PII) is strictly opt-in, explicitly consented to, and logically partitioned from core manufacturing data.

  • Localisation Privacy: Market Pack content and translations are brand-controlled operational data — no consumer-facing PII is collected, stored, or processed through the localisation layer.

5. Bank-Grade Encryption & Secret Management

  • In Transit & At Rest: All network traffic is strictly enforced via TLS 1.2+ (TLS 1.3 preferred). All databases, continuous backups, and underlying storage volumes are encrypted at rest using industry-standard AES-256 encryption managed by top-tier cloud Key Management Services (KMS).

  • Zero Client-Side Secrets: No cryptographic secrets, API keys, or database credentials are ever exposed to the client or browser environments.

6. Bulletproof API & Edge Infrastructure

  • Cryptographic Idempotency: Manufacturing environments are chaotic. Our API Gateway enforces strict client- and server-side idempotency keys. This mathematically guarantees that network retries, connection drops, or ERP system hiccups cannot result in duplicated tokens or corrupted production runs.

  • Global Edge Defense: Public-facing resolver endpoints are deployed to a globally distributed Edge network, armed with aggressive rate-limiting, cache shielding, and bot-mitigation to absorb DDoS attempts and neutralize data scraping.

7. Deterministic AI Boundaries

We utilize AI to enhance security, never to compromise your data integrity.

  • Read-Path Heuristics Only: Machine learning is deployed strictly for read-path threat intelligence — such as detecting anomaly patterns in scan velocity or geographic distribution to instantly flag cloned QR codes.

  • Zero Write Access: AI is physically ring-fenced from your compliance data. It has zero write-access and is systematically incapable of altering DPP metadata, changing batch statuses, or issuing product identities.

  • No Proprietary Training: Your supply chain data is yours. We do not use proprietary customer data to train public foundation models.

8. Open Standards & Interoperability

Security through obscurity is a failed model. We build on transparent, global standards.

  • GS1 Digital Link Compliance: Our resolution architecture is natively built on the GS1 Digital Link standard, ensuring your product identities are globally interoperable and future-proofed for retail point-of-sale systems.

  • No Vendor Lock-in: By adhering to GS1 open standards and providing comprehensive API access, your data remains portable and entirely under your control.

9. Enterprise Compliance Readiness

tieback

is engineered to exceed the rigorous compliance requirements of the world’s largest enterprises.

  • SOC 2-Aligned Infrastructure: From day one, tieback has been built on SOC 2-aligned controls. This includes mandatory CI/CD peer reviews, automated vulnerability scanning, Zero-Trust network perimeters, and comprehensive audit logging.

  • Exportable Evidence: Full audit logs and product batch records are instantly exportable via API or CSV to support your internal compliance, ESG reporting (like ESPR), and regulatory archiving requirements.