Security Transparency

Zero Exfiltration. Local Sovereignty. Read-Only Intelligence.

1. The Zero Exfiltration Promise

Netra tools are architected for high-security environments where data sovereignty is paramount. Unlike SaaS-based identity tools, Netra performs all analysis locally.

Your Active Directory metadata, Entra ID configurations, and security findings never leave your infrastructure. There is no cloud backend that mirrors your identity core.

2. Local Data Sovereignty

Because Netra operates as a standalone binary, you retain absolute control over the audit lifecycle.

  • Data Residency: Scan results are stored in memory or local forensic reports (CSV/PDF) on the machine where you run the tool.
  • No Piling: We do not aggregate customer findings into a central "threat intelligence" database. Your vulnerabilities are your business alone.
  • Zero Telemetry: Netra-Go tools perform as strictly local binaries. No usage patterns, discovered security gaps, or crash reports are ever transmitted.

3. Cryptographic Integrity

We ensure the code you run is the code we signed.

  • Signed Binaries: All Netra executables are code-signed to prevent tampering and provide provenance.
  • Air-Gapped Licensing: License keys use RS256 JWT signatures. Validation occurs entirely offline within the binary. No external licensing server communication is required.

4. Least-Privilege Execution

Netra is designed to run with standard user or specialized read-only permissions whenever possible.

  • AD Explorer: Operates using standard LDAP queries. Does not require Domain Admin rights to identify most attack paths.
  • Entra Explorer: Requests strictly limited Microsoft Graph `Directory.Read.All` scopes. We never request write or delete permissions.

5. Procurement & Audit Support

We provide comprehensive documentation to accelerate Information Security (InfoSec) reviews.

Security Package Includes:

  • Standard Information Gathering (SIG): Pre-filled questionnaire for third-party risk.
  • Data Flow Diagrams: Visual proof of Zero-Exfiltration architecture.
  • SBOM: Software Bill of Materials for vulnerability tracking.
Request Security Pack