OUTSQUID
GLOBAL SECURITY & ZERO-TRUST DISCLOSURE
Effective Date: May 3, 2026
Document Classification: Public / Enterprise Security Posture
1. INTRODUCTION AND THE ZERO-TRUST MANDATE
In the logistics, maritime, and certified public accounting (CPA) sectors, data is the most critical corporate asset. OutSquid operates under a foundational, uncompromising premise: Zero-Trust.
We do not require our enterprise clients to trust our offshore infrastructure with their proprietary data. Instead, we have engineered an operational environment where trust is mathematically and structurally irrelevant. OutSquid brings highly trained human capital to your data environment; we do not extract your data into ours.
This disclosure outlines the stringent physical and digital security architectures deployed across all OutSquid global operational hubs to prevent data exfiltration, ensure continuous operational continuity, and maintain absolute data sovereignty for our clients.
2. DIGITAL SECURITY & ZERO-TRUST INFRASTRUCTURE
Our digital security posture is designed to ensure that OutSquid operators function strictly as secure endpoints accessing your fortified environments.
2.1. Identity and Access Management (IAM)
- Cryptographic & Biometric Authentication: Access to any OutSquid workstation requires mandatory, multi-factor authentication (MFA). This includes FIDO2-compliant hardware keys or biometric verification prior to session initiation.
- Role-Based Access Control (RBAC): Internal network privileges operate on a principle of least privilege (PoLP). Operators have zero lateral movement capabilities within our internal network.
2.2. The VDI/VPN Execution Mandate
- Absolute Data Isolation: OutSquid operators execute all client workflows exclusively within the client’s secure environment via Virtual Desktop Infrastructure (VDI), Secure Web Gateways (SWG), or heavily encrypted, client-provisioned VPNs.
- Zero Local Persistence: We deploy “dumb terminal” architecture. No client data, including temporary cache files, PDFs, or workflow outputs, is ever downloaded, hosted, or stored on local OutSquid physical drives or local area networks. All operational sessions are strictly ephemeral.
2.3. Continuous Verification and Quality Assurance
- Active Telemetry & Monitoring: To guarantee SLA adherence and mitigate insider threats, all operator sessions are subject to immutable tracking.
- Screen and Keystroke Logging: We deploy enterprise-grade Quality Assurance (QA) software that logs keystrokes and captures randomized screen telemetry. This data is utilized strictly for workflow optimization, error rate reduction, and anomaly detection, ensuring complete operational transparency for the Client.
3. PHYSICAL SECURITY & FACILITY HARDENING
Digital security is fundamentally compromised if the physical endpoint is vulnerable. OutSquid’s global operational floors are physically hardened environments designed to neutralize analog data exfiltration.
3.1. The Clean-Desk Protocol
- Zero Analog Media: Production floors enforce an absolute clean-desk policy. Paper, notebooks, pens, and any analog recording materials are strictly prohibited within the operational perimeter.
3.2. Hardware Lockdown
- Disabled Peripherals: All operational workstations have their BIOS locked, and all USB ports, Bluetooth modules, and external storage interfaces are physically and programmatically disabled.
- Print Restriction: Workstations have zero connectivity to printing or external rendering devices.
3.3. Contraband and Mobile Device Restriction
- Sterile Production Floors: Personal mobile phones, smartwatches, tablets, and personal recording devices are categorically banned from the production floor.
- Secure Storage: Operators are required to deposit all personal electronics in secure, biometric lockers located outside the operational perimeter before passing through the final security checkpoint.
3.4. Facility Access Controls
- Biometric Entry: Physical entry to the operational floors is gated by biometric scanners (fingerprint or iris) and RFID badge access, cross-referenced against active shift schedules.
- Continuous Surveillance: All production zones, ingress/egress points, and server rooms are monitored 24/7/365 by high-definition, closed-circuit television (CCTV) with minimum 90-day retention policies.
4. FRAMEWORK ALIGNMENT & STRUCTURAL RESILIENCE
OutSquid does not rely on ad-hoc security measures. Our internal operating procedures, risk matrices, and incident response protocols are engineered in strict alignment with the world's most rigorous enterprise compliance frameworks.
4.1. ISO 27001 Alignment
Our Information Security Management System (ISMS) is designed in direct alignment with the ISO/IEC 27001 standard. This dictates our systematic approach to managing sensitive company and client information, ensuring that people, processes, and IT systems are subject to continuous risk management and iterative hardening.
4.2. SOC 2 Type II Alignment
We operate in accordance with the Trust Services Criteria established by the American Institute of Certified Public Accountants (AICPA). Our internal controls are heavily focused on the core pillars of a SOC 2 Type II framework:
- Security: Protection against unauthorized access (both physical and logical).
- Availability: Structural resilience, redundant ISP routing, and backup power matrices to ensure 99.9% uptime for our offshore operational pods.
- Confidentiality: Rigorous data isolation ensuring client intellectual property remains siloed and entirely inaccessible to unauthorized personnel or other OutSquid clients.
5. ENTERPRISE SECURITY INQUIRIES AND AUDITING
We understand that enterprise security is a continuous dialogue, necessitating rigorous vendor evaluation. For detailed penetration test summaries, VDI integration schematics, or to schedule a remote audit of our facility controls as required by your internal governance, please direct communications to our internal security operations desk.
OutSquid Security Operations Center (SOC)
Email: secops@outsquid.com
Attention: Office of the Chief Information Security Officer (CISO)
Modifications to our security posture and compliance alignments will be updated on this disclosure page to reflect our most current operational capabilities.