Nobody sees what they don't need.
Tenant isolation at the row level. Role-based scopes on every API. Operator access is break-glass, logged, and reviewed — your data isn't open to our support team by default.
Freight is a regulated industry — ELD hours, FMCSA scorecards, customs attestations, escrowed settlements. We treat your data the same way the industry treats its cargo: chain of custody, auditable handoffs, and proof on arrival.
Tenant isolation at the row level. Role-based scopes on every API. Operator access is break-glass, logged, and reviewed — your data isn't open to our support team by default.
TLS 1.3 end-to-end. AES-256 at rest on every database, blob, and backup. Per-tenant key namespaces with rotation on schedule and on demand.
Every rate quote, every RIOS agent action, every settlement event is immutable, time-stamped, and replayable. You can reconstruct any decision we made — or you made — end to end.
Multi-region active-passive with automated failover. Graceful degradation over outage. We publish our status page, our incident reviews, and our RTO/RPO targets in plain English.
RIOS was built for regulated data from day one. Each layer does one job well, and each layer is independently auditable.
Managed WAF with rate-limiting, bot mitigation, and geo-aware rulesets. DDoS absorption at the edge before requests touch our origin.
Every service-to-service call is mutually authenticated and encrypted. Service identity is cryptographic — not vibes.
No implicit trust inside the VPC. Every request carries a verified identity; every handler re-authorizes before reading.
SAML 2.0 and OIDC for enterprise customers. SCIM provisioning keeps your IdP the source of truth for joiners, movers, leavers.
TOTP, WebAuthn, and hardware keys supported. Enforced at the tenant level; we can require it for privileged roles without workarounds.
Quote-only. Dispatch-only. Read-only finance. Roles map cleanly to how freight teams actually work — not a generic admin/user split.
Hard row-level isolation enforced in the query layer — not just at the app tier. Cross-tenant reads fail closed, audited, and alerted.
KMS-backed envelope encryption with per-tenant data keys. Rotation automated on schedule; re-encryption without downtime.
Hourly point-in-time recovery. Quarterly full-restore drills to an isolated tenant — because an untested backup is a hypothesis.
Append-only, cryptographically signed, retained by tenant policy. Exportable on request. You can prove what happened — not just remember.
Behavioral baselines per user, per tenant, per agent. Off-pattern actions escalate before a human sees them.
Stream your Eusorone events into your SIEM. No more swivel-chair compliance. Pipe it into Splunk, Datadog, or your custom stack.
Freight lives at the intersection of DOT, FMCSA, CBP, SAT, and a dozen state regimes. RIOS encodes those frameworks as first-class primitives, not afterthought reports.
We're in active SOC 2 Type II observation with a top-tier auditor. Interim trust brief available under NDA for qualified customers.
Data subject access requests, portability, erasure — all exposed through self-serve tools and our DPA. We publish the retention schedule, not just reference it.
RIOS respects ELD records as the source of truth. Dispatch agents will not propose loads that violate HOS; violations are flagged before dispatch, not after.
NOM, CA Prop 65, ADR, IMDG, FSMA — validated before a load is booked, not after the truck is at the border. Customs attestations live with the load, not in a PDF inbox.
We don't store raw card data. Settlements flow through tokenized, PCI-certified processors. Your AR/AP team never sees a PAN.
Third-party pen tests against RIOS APIs and the EusoTrip surface. Findings remediated on published SLAs. Executive summary available on request.
Email security@eusorone.com with details. We acknowledge reports within one business day and aim to triage within three. We don't pursue legal action against good-faith researchers who follow our disclosure policy.
PGP: fingerprint published at /.well-known/security.txt (coming soon). Scope: *.eusorone.com, *.eusotrip.com. Out of scope: third-party vendors, social engineering of employees, physical attacks.
Enterprise security packs — SIG Lite, CAIQ, our DPA, and subprocessor list — are available to qualified customers under NDA. We respond within one business day.