TRUST CENTER
Security, transparency, and accountability — for a product that governs accountability.
Everything you need to evaluate RANKIGI for your organization. No security questionnaire needed.
Last updated: March 2026 · Contact: security@rankigi.com
Security Architecture
How RANKIGI protects your data. SHA-256 hash chaining, Ed25519 signing, AES-256-GCM encryption, and why hash-only storage means a breach reveals nothing sensitive.
→
5W1H Scoring Methodology
Exactly how RANKIGI calculates governance scores. Full weight breakdown, component definitions, and how certificates are issued. No black boxes.
→
Compliance Framework Mapping
Control-by-control mapping of RANKIGI features to EU AI Act, SOC 2, HIPAA, ISO 42001, and PCI-DSS.
→
Data Practices and Privacy
What RANKIGI stores, what it never stores, data residency, retention policies, breach notification protocol.
→
Open Agent Governance Standard v1.1
The open specification RANKIGI implements. Published under CC BY 4.0. Any organization can implement it.
→
System Status and Incident History
Live uptime, historical incident records, and transparent communication during outages.
→
Hash-only storage — raw sensitive data never enters RANKIGI systems.
Passive observation — RANKIGI never sits in your agent’s execution path.
Open standard — our governance specification is public and free to implement.