Security & assurances

Enterprise-grade safeguards for every MafutaAI workload

Our marketplace is built for regulated teams that need predictable isolation, verifiable controls, and humans who respond when seconds matter. Below is the security stack that protects GPUs, data, contributors, and billing flows.

POPIA & CPA alignedZero-trust networkingDedicated GPU isolation24/7 monitoring

Always-on security desk

Reach the rotation any time via ops@mafutai.co.za or the console > Support menu. Severity 1 incidents wake an engineer, an incident commander, and our compliance officer.

  • 15 minute acknowledgement target for Sev1 / Sev2 tickets
  • Joint tabletop exercises offered quarterly
  • Signed post-incident reports within five business days

Defense in depth

Controls span hardware, software, people, and process so a single failure never compromises our customers.

Hardened infrastructure

Bare metal hosts ship with CIS Level 1 baselines, signed updates, and drift detection so customer workloads always boot on a known-good image.

  • Single-tenant GPU leases with dedicated NVMe and RAM
  • Secure boot, TPM-backed attestation, and immutable kernel modules
  • Ephemeral disks are shredded via blkdiscard immediately after release

Network & access isolation

Every provider node sits behind a WireGuard overlay and per-instance firewalls enforced by eBPF, giving us deterministic networking paths and audit trails.

  • Mandatory MFA + FIDO2 for the console and API keys
  • Customer SSH keys scoped per instance with forced command restrictions
  • No inbound management ports are exposed to the public Internet

Data stewardship

Secrets, telemetry, and chat content move across TLS 1.3 and land inside encrypted storage pools located solely in South Africa.

  • AES-256-GCM at rest with per-lease envelope keys
  • HashiCorp Vault backed by HSMs for API keys and provider credentials
  • Audit trails are hashed hourly and retained for a minimum of 12 months

Operational readiness

A pager-backed security desk owns 24/7 monitoring, tabletop-tested runbooks, and joint incident reviews with customers.

  • Dedicated rotations with <15 minute acknowledgement targets
  • Quarterly penetration tests plus continuous software composition analysis
  • Dual-control change management for infrastructure and billing flows

Customer assurances

Each promise is documented in our contracts and validated by telemetry you can review in real time.

Assured isolation

GPU leases are single tenant, and every teardown wipes VRAM, NVMe, and tmpfs before a new workload can boot.

Ephemeral OS imagesAutomated tamper logs

Data residency

Compute stays inside Johannesburg and Cape Town metros to meet POPIA, CPA, and local data-sovereignty requirements.

Regional failoverResidency attestation on request

Provider vetting

Every provider passes KYC, proof-of-hardware checks, and AML screening before their GPUs hit the marketplace.

Hardware probesDocumented payout audits

Transparent logging

Customers can stream real-time access logs, console actions, and billing events or request an immutable export for compliance.

Webhook fan-outSHA-256 log sealing

Security control layers

Designed for auditors and engineers alike—understand what is enforced by default and where you can plug in your own tooling.

Identity & access

SAML/SCIM integrations, enforced MFA, and role-scoped API keys ensure that only approved operators ever touch production workloads.

Org-level MFASAML + SCIMRotating API keys

Secure delivery

Golden container templates, SBOM tracking, and attested kernel modules stop supply-chain drift before it reaches customers.

Signed templatesSBOM diffsRegistry scanning

Runtime insight

Fleet metrics, Prometheus exporters, and a managed SIEM feed our SOC so anomaly detection happens within minutes, not hours.

SIEM correlationeBPF telemetryPrometheus hooks

Support & compliance

Dedicated POPIA and AML officers partner with engineering to review changes, document controls, and keep audit evidence up to date.

POPIA readyAML screeningQuarterly reviews

Incident response blueprint

Runbooks follow NIST 800-61 and South African regulatory timelines. Customers are looped in from the very first alert.

  1. Detect & confirm

    Alerts flow into a managed SIEM with machine learning correlation and a human on-call covering 24/7. Target triage time is <5 minutes.

  2. Contain

    We isolate the affected GPU, revoke API tokens, snapshot volatile evidence, and notify customer owners immediately.

  3. Eradicate & recover

    Fresh images are provisioned, Vault material is rotated, and forensic artifacts stay sealed for regulators and customer review.

  4. Notify & learn

    POPIA/CPA breach windows (72 hours) are baked into our runbooks. We share timelines, mitigations, and next steps after every event.

Contact and escalation channels

Choose whichever path suits the severity of your request. Each channel is logged and tracked.

Security desk (24/7)ops@mafutai.co.za

Pager-backed alias for incident response, threat intel, and urgent containment requests.

Responsible disclosuresupport@mafutai.co.za

Email with the subject ‘Security finding’ or file a ticket via the console. We acknowledge within one business day.

Command & compliancecharles@mafutai.co.za

Escalate AML, fraud, or contractual security questions directly to MafutaAI command.