Now live — Processing 350+ page CPCL tenders in under 20 minutes. Read Case Study

Security

Your data never leaves your infrastructure.
Period.

Tender Intelligence is built with a two-system air-gapped architecture. Document storage and AI processing run entirely within your servers. No data not a single page, not a single byte ever leaves your network perimeter. Compliant with MeitY, CERT-In, IT Act 2000, and DPDP Act 2023.

Compliance Framework

IT Act 2000DPDP Act 2023CERT-In 2022MeitY Cloud PolicyISO 27001 AlignedGDPR Ready
Architecture

Two-system air-gapped architecture.

System 1Storage

Document Vault

Stores all uploaded documents, processed outputs, and extracted text. Encrypted at rest (AES-256). Fully air-gapped no internet access. Lives on your on-premise servers, accessible only via internal LAN.

  • AES-256 encryption at rest
  • No internet access
  • Internal LAN only
System 2Processing

AI Processing Engine

Runs document processing, AI inference, criteria matching, and evaluation logic. Connects only to System 1 via internal network. No outbound calls. No telemetry. No external dependencies during processing.

  • No outbound calls
  • No telemetry
  • No external dependencies
No data not a single page, not a single byte ever leaves your network perimeter. We treat your tender documents with the same security posture as classified defence data.
Security Features

Security is not a feature. It's the architecture.

01

Air-Gapped Deployment

Fully on-premise on Indian government-approved servers. Zero internet dependency for processing. Works in environments where even outbound DNS is blocked.

02

End-to-End Encryption

AES-256 at rest and TLS 1.3 in transit. Encryption keys generated and stored within your HSM/KMS. Keys never leave your infrastructure.

03

Role-Based Access Control

Granular RBAC with MFA. Four role tiers Admin, Evaluating Officer, Reviewer, Auditor. Every user action is logged with tamper-proof audit trails.

04

CERT-In Compliant Logging

Mandatory 180-day log retention per CERT-In 2022 directive. Forensic-ready audit records. Append-only logs that cannot be modified or deleted.

05

Zero Data Retention

No document data stored post-evaluation. Documents purged per your retention policy. No shadow copies, no caching, no data used for model training.

06

Vulnerability Management

Quarterly VAPT by empanelled CERT-In auditors. OWASP Top 10 controls enforced continuously. Penetration testing reports available on request.