Compliance

Technical controls that support compliance

MindooDB provides cryptographic building blocks — end-to-end encryption, signed append-only history, and coordinated data erasure — that address key technical requirements of common regulatory frameworks. Compliance itself is an organizational responsibility; MindooDB gives you a strong foundation to build on.

Compliance features: HIPAA, SOX, GDPR, PCI-DSS support through encryption, audit trails, and access controls
Regulatory standards

Compliance by regulation

HIPAA (Healthcare)

Health Insurance Portability and Accountability Act requires patient data protection, access controls, and audit trails.

How MindooDB helps
  • End-to-end encryption ensures patient data is never visible to servers
  • Signed write history — every change is Ed25519-signed, proving who wrote what and when
  • Fine-grained access control with named keys for different care teams
  • Data retention strategies via time-sharded databases and archival
  • Offline operation for field healthcare workers and remote clinics

⚠️ HIPAA also requires read-access logging, BAAs, administrative safeguards, and physical security — these are your responsibility to implement around MindooDB.

See healthcare use cases → | Detailed patterns →

SOX (Financial)

Sarbanes-Oxley Act requires financial audit trails, immutable records, and access controls.

How MindooDB helps
  • Immutable records through append-only architecture
  • Cryptographic integrity — hash-chained entries prove records haven't been altered
  • Complete write history with signed authorship for audit requirements
  • Time travel to reconstruct any historical state
  • Signed changes prove authorship of all modifications

⚠️ SOX also requires internal controls, management certifications, and segregation of duties — these are organizational responsibilities.

See financial services use cases → | Detailed patterns →

GDPR (Data Protection)

General Data Protection Regulation requires right to be forgotten, data portability, consent tracking, and data protection by design.

How MindooDB helps
  • Coordinated data erasurepurgeDocHistory() propagates deletion requests via the directory DB to all synced clients
  • Data portability through document export capabilities
  • Data protection by design through end-to-end encryption
  • Write audit trail — signed, append-only history of all data changes

⚠️ Purge requests reach clients on their next directory sync — devices that never reconnect retain the data. GDPR also requires consent management, DPO appointment, and processing records — these are your responsibility.

See compliance patterns →

PCI-DSS (Payments)

Payment Card Industry Data Security Standard requires payment card data protection, access controls, and audit trails.

How MindooDB helps
  • Strong encryption — AES-256-GCM at rest, per-user RSA in transit
  • Access controls with named keys for restricted access to sensitive data
  • Write audit trail — signed, append-only history of all data changes

⚠️ PCI-DSS is a comprehensive standard covering network segmentation, vulnerability management, monitoring, and more. MindooDB addresses the encryption and access control requirements — the rest is your responsibility. Consider whether you need to store card data at all.

See compliance patterns →

What's built in vs. what you build

Technical controls provided by MindooDB

Built-in: Audit & integrity
  • ✅ Complete write history (append-only)
  • ✅ Cryptographic signatures (authorship proof)
  • ✅ Tamperproof records (hash-chained)
  • ✅ Time travel (reconstruct any state)
  • ✅ Timestamped changes
Built-in: Data protection
  • ✅ Client-side encryption (AES-256-GCM)
  • ✅ Fine-grained access control (named keys)
  • ✅ Key management (password-protected KeyBag)
  • ✅ Coordinated data erasure (directory-propagated purge)
  • ✅ Data sovereignty (client-side tenants)
You build: Application-level
  • ⚙️ Read-access logging (application layer)
  • ⚙️ Consent management (application layer)
  • ⚙️ Role-based access control (using named keys)
  • ⚙️ Data retention policies (using time-sharding)
  • ⚙️ Compliance reporting (using audit data)
Audit trail

Complete write history

What's logged automatically
  • Every write is cryptographically signed with the author's Ed25519 key
  • Timestamps are included in every change entry
  • Document history can be traversed with iterateDocumentHistory()
  • Time travel allows reconstructing any historical state
  • Deletions are marked with tombstones (preserving history)

Note: MindooDB automatically logs writes (who changed what). Read access logging (who viewed what) must be implemented at the application level.

Use cases
  • Prove who changed what and when
  • Reconstruct state at any point in time
  • Demonstrate data integrity to auditors
  • Build application-level read-access logging on top
  • Support legal discovery requirements

See time travel docs →

Data retention

Retention policies and archival

Retention strategies
  • Time-based sharding — Create databases by time period (yearly, monthly)
  • Archival databases — Move old data to read-only archive databases
  • Document lifecycle — Mark documents as archived instead of deleting
  • Coordinated purge — Admin-signed purge requests propagate via directory DB; clients execute on next sync

See data modeling patterns →

Compliance considerations
  • Append-only nature means data accumulates over time
  • Plan for growth management from the start
  • Use time-based sharding for efficient archival
  • Consider retention requirements per document type
  • Coordinated purge propagates to synced clients; offline devices retain data

See compliance patterns →

Regulatory mapping

Compliance feature matrix

Requirement HIPAA SOX GDPR PCI-DSS
Data encryption ✅ E2E encryption ✅ E2E encryption ✅ E2E encryption ✅ E2E encryption
Encryption-based access control ✅ Named keys ✅ Named keys ✅ Named keys ✅ Named keys
Write audit trail ✅ Signed, append-only ✅ Signed, append-only ✅ Signed, append-only ✅ Signed, append-only
Data integrity ✅ Hash-chained ✅ Hash-chained ✅ Hash-chained ✅ Hash-chained
Data erasure ⚠️ Coordinated purge N/A ⚠️ Coordinated purge* N/A
Read-access logging ⚙️ You build ⚙️ You build ⚙️ You build ⚙️ You build
Consent management N/A N/A ⚙️ You build N/A

✅ = built-in   ⚠️ = built-in with caveats   ⚙️ = you implement at application level
* Purge requests propagate via directory DB to all synced clients. Devices that never reconnect retain the data.

For detailed implementation patterns, see the compliance patterns documentation.