The Osage Group — a Native-owned Osage family holding company. Learn more →
Osage Finance

Security

La sécurité — par défaut, vérifiable, post‑quantique.

Data at rest — envelope encryption by default

Every Osage Finance application stores sensitive data under the canonical envelope: Osage KMS as root of trust (HSM-backed, FIPS 140-3 boundary); per-org Key Encryption Keys; per-row Content Encryption Keys wrapped under the KEK; AES-256-GCM with AAD-bound nonces. Spec at osage.tech/docs/storage.

Crypto-shredding — revoking a client's KEK in KMS renders that client's entire dataset unreadable, instantly. Right-to-erasure and data-residency revocation is one KMS API call.

Data in transit

Post-quantum posture

The Osage post-quantum stack runs throughout: ML-KEM (FIPS 203), ML-DSA (FIPS 204), SLH-DSA (FIPS 205), Falcon, and the named higher-level primitives — Osage Quasar (round signing / consensus), Osage Pulsar (threshold lattice signing), Osage Magnetar (high-throughput batched signing), Osage Prism (sub-sampled finality), Osage Corona (cross-chain threshold oracle). High-value transactions sign through Pulsar threshold, not single-key custody.

Key management (Osage KMS)

Compliance frameworks

Supply chain

Audit & logging

Every administrative action and every KMS unwrap is a logged event. Logs are append-only, content-addressed, anchored to Osage Network for tamper-evidence. Retention per customer policy. Federal customers receive structured-export support on request.

The standing post-quantum brief is held by the Chief Architect & Cryptographer. Full Osage cryptographic posture and NIST participation at osage.cloud/crypto.