Post-quantum-ready from the ground up. FIPS 203 / 204 aligned cryptography. SOC 2 Type 1 audit engagement signed. The controls below are implemented and operational today, not aspirational.
Thirty-two controls across six domains. These are operational today, not scheduled. Evidence is available for review under NDA as part of the SOC 2 engagement package.
Hive engages the following sub-processors. Each processor is contractually bound to data protection standards consistent with Hive's customer DPA. Customer notification of material sub-processor changes is provided with 30 days advance notice.
| Processor | Purpose | Region | Compliance |
|---|---|---|---|
| Render | Compute infrastructure, API hosting, background workers | US East (Oregon) | render.com/security → |
| Cloudflare | CDN, WAF, DDoS protection, Workers edge compute, DNS | Global (Anycast) | cloudflare.com/trust-hub → |
| Stripe | Payment processing, subscription billing, invoicing | US (Stripe Inc.) | stripe.com/privacy → |
| Mercury | Operating banking, treasury, ACH disbursements | US (FDIC-insured) | mercury.com/legal/privacy → |
| GitHub | Source code hosting, CI/CD, issue tracking | US (GitHub, Inc.) | github.com/privacy → |
| AWS S3 via Render | Object storage for receipts, evidence bundles, log archives | US East (us-east-1) | aws.amazon.com/compliance → |
Hive Civilization welcomes security researchers. We commit to a fair, transparent disclosure process.
Encrypt sensitive reports using our PGP key, available on request at the address above. Provide sufficient detail to reproduce the issue. Do not access customer data beyond what is necessary to demonstrate the vulnerability.
In scope: thehiveryiq.com and all subdomains, Hive API endpoints, Cloudflare Workers serving hive-signed receipts, Hivemorph admin panel. Out of scope: third-party sub-processors, social engineering, denial-of-service testing, automated scanning without prior approval.
| Researcher | Finding | Date |
|---|---|---|
| First responsible disclosure reporter will appear here. | ||
We do not offer monetary bounties at this time. We commit to public acknowledgement, coordinated disclosure, and a letter of commendation for valid critical findings.
External penetration test by an independent firm is scheduled for Q3 2026. This is not yet complete. Results will be available in summary form to enterprise customers under NDA following remediation.
Scheduled — Q3 2026Monthly internal red-team exercises covering authentication bypass, privilege escalation, and API abuse scenarios. Exercises are conducted by the founder against staging environments and documented in the internal security log.
Active — MonthlyThe Wave-Lattice cryptographic substrate runs the NIST Automated Cryptographic Validation Protocol self-test suite on every deployment. Results are published on the audit-readiness endpoint at /hive-pq.html.
Passing — Every DeploySix-phase incident response process. Severity definitions are public. Customer notification SLAs are contractual obligations, not aspirational targets.
| Severity | Definition | Customer Notification | Post-Mortem |
|---|---|---|---|
| Sev 1 | Complete service outage, confirmed data breach, or cryptographic key compromise | 1 hour | 5 business days |
| Sev 2 | Significant performance degradation, partial service disruption, or potential data exposure | 4 hours | 5 business days |
| Sev 3 | Minor functionality impacted; no data risk; workaround available | Next business day | Optional |
Incident status updates published at status.thehiveryiq.com during active incidents. Subscribe for email or webhook alerts.
Enterprise procurement and security questionnaires do not have to be a bottleneck. Hive commits to fast turnaround on standard documentation requests.
Full SIG Lite and SIG Core responses available. Turnaround within 5 business days of NDA execution.
Cloud Security Alliance Consensus Assessment Initiative Questionnaire completed and available under NDA.
Enterprise-specific security questionnaires addressed within 5 business days. Contact us with your template.
Hive standard DPA template available immediately. Redlines reviewed within 5 business days. GDPR and CCPA clauses included.
Hive standard MSA template available on request. Enterprise-negotiated terms available for contracts above threshold.
Live 60-minute security architecture walkthrough available for enterprise prospects. Schedule via [email protected].
For Toby Pischl (Netskope) and Cloudflare procurement: the SOC 2 engagement letter is available on request under a mutual NDA. Contact [email protected] directly with your organization and questionnaire template.
These are our genuine targets. We will not represent a certification as complete until the independent body issues the credential.
Audit engagement signed. Controls inventory implemented. Report expected Q4 2026.
Underway12-month observation period begins after Type 1 report. Type 2 report target Q3 2027.
PlannedISMS documentation and gap analysis underway. Certification audit targeted 2027 in parallel with SOC 2 Type 2 observation period. ISO 27001 self-attested posture →
PlannedFedRAMP Moderate authorization targeted 2028 for government and regulated-sector deployments. Requires SOC 2 Type 2 as a prerequisite.
FutureHive Civilization is a single-founder operation today. We address key-person risk transparently through documented controls, not by obscuring the reality. The founder-risk page details treasury continuity, code escrow, legal succession, and the insurance roadmap.
Read the founder-risk disclosure →For vulnerability reports, questionnaire requests, NDA execution, or enterprise security reviews, reach us below. We respond within 2 business days.