Compliance & Security

Audit-ready by construction.

Garden was built under a development constitution that treats every line as if it were handling real money — because it is. The chains of evidence exist before the auditor arrives. We do not ship features that cannot be proven correct after a cold restore.

Garden Financial · v1.3.2 — DesktopLIVE
Search…⌘K
AACME Holdings

KYC Sessions

Updated Apr 29 at 14:02
SAGE · /compliance/kyc-sessions

KYC · session 3f81-0a2c · Reginald Maxwell

reviewer required
RM
SUBJECTReginald MaxwellDOB · 1982-03-14 · UK
CASE3f81-0a2copened 4 min ago
ROUTEUK individual · standardSLA · 24h
  • Government IDOnfidopassport · United Kingdommatch
  • Liveness selfieOnfido98.4% similaritymatch
  • Address proofVeriffutility · 1 mo oldmatch
  • OFAC / EU / UNSageno list hitsclear
  • PEP screeningSageno political exposureclear
  • Adverse mediaSage1 low-confidence articlereview
evidence pack · 11 docs · sealed blake3:7a91…posts to Bean on approval · vine event queued
FIG. 0.A — GARDEN DESKTOP / DASHBOARDThe actual UI. No marketing simulator.
Standards

Where Garden stands today.

StandardScopeOwnersStatus
SOC 2 Type IISecurity · Availability · ConfidentialitySage · Bean · Vineaudit-ready
ISO 27001:2022Information security managementAll servicesaudit-ready
PCI DSS 4.0Card data scope minimizationChard · Greenhouseself-assessed
ASC 606 / IFRS 15Revenue recognitionBean · Cabbagebuilt-in
GDPR · CCPA · PIPEDA · LGPDData subject rightsTurnip · Sage · Basillive
NACHA · Reg E · Reg JACH originationBranches · Chardlive
FATF Travel Rule (TRP · TRUST)Counterparty info exchangeSage · Greenhouselive
MiCAEU crypto-asset service provisionGreenhouse · Sageaudit-ready
NIST 800-63 / NIST 800-53Identity assurance · controlsTurniplive
SOX 404Internal controls over financial reportingBean · Celeryaudit-ready
Vs. the compliance stack

Most companies bolt four vendors together. Garden ships compliance as a property of the ledger.

Vanta and Drata watch your SaaS perimeter. Persona and Alloy run KYC, but stop there. Garden treats compliance as inseparable from the book of record: every screening, every period close, every signed transfer lands on the same audit chain. One stack, one principal, one provable history.

CapabilityVantaDrataPersonaAlloyGarden
SOC 2 / ISO 27001 controls✓ Sage + Bean
GDPR / CCPA DSR automation
KYC + liveness + document✓ Onfido + Veriff pluggable
OFAC + EU + UN + UK HMT screenpartial
PEP + adverse media (multi-lang)✓ 15+ languages
FATF Travel Rule (TRP / TRUST)✓ Sage + Greenhouse
Tax forms (1099, K-1, 1042-S)✓ Basil-rendered
ASC 606 / IFRS 15 rev rec✓ Bean-derived
Period seal (cryptographic)✓ blake3
Hash-chained audit traillogslogslogslogs✓ ed25519
Posts evidence to ledger✓ Bean atomic
Agent-callable screening✓ MCP
One contract, full coverage
Security pillars

Eight, all of them load-bearing.

01

Encrypted at rest

AES-256-GCM with envelope encryption. Keys held in OpenBao with HSM root of trust.

02

Encrypted in transit

TLS 1.3, rustls only. mTLS between Garden services. Pinned certificates for partner integrations.

03

Signed events

Every Vine event carries an Ed25519 signature and a per-tenant ordered cursor.

04

Idempotent writes

Every write accepts an idempotency key. Replays are safe. Double-charges are mathematically impossible.

05

Cryptographic period seal

Closing a period in Bean produces a blake3 root over every journal entry.

06

Hardware-backed signing

Greenhouse transactions, period closes, and admin changes can require YubiKey or Ledger touch.

07

Least-privilege access

Arsenal tokens are minted just-in-time, scoped to action class, time-bound, bound to a principal DID.

08

Audit chain

Every write records actor, principal, IP, device, and time, with hash linkage to the previous record.

Bug bounty

$250,000 top reward.

We pay for vulnerabilities in proportion to what they could move. The maximum payout is reserved for issues that allow theft of customer funds, bypass of FROST signing, forgery of period seals, or extraction of cryptographic material. Median payouts are $5,000–$25,000.

  • · Scope: Bean, Chard, Cabbage, Greenhouse, Turnip, Sage, Basil
  • · In-scope chains: BTC, ETH (+ L2s), SOL, USDC, USDP, PYUSD
  • · Out: social engineering, denial of service, third-party services not owned by Garden
  • · Disclosure: 90 days from triage acceptance
  • · Contact: security@gardens.ml · PGP fingerprint published
Audits

External attestations.

Annual

Greenhouse — FROST implementation

Cryptography lab

Annual

Bean — period seal & audit chain

Application security firm

Annual

Chard — payment routing & idempotency

Independent reviewer

Annual

Turnip — identity & lineage

Identity-systems specialist

Annual

Garden — SOC 2 Type II

Big-four-affiliated CPA

Annual

Garden — ISO 27001:2022

Accredited certifier

The boring parts, taken seriously.