Built on the security backbone you already trust.
GemCore OS runs on Microsoft Azure and authenticates with Microsoft Entra ID — the same enterprise identity, encryption and threat-protection backbone that already secures your Microsoft 365 tenant.
Identity & single sign-on
Sign-in is delegated to Microsoft Entra ID. Conditional Access, multi-factor authentication and device-compliance policies you already enforce on Microsoft 365 apply to GemCore OS automatically — no parallel password store to manage or breach.
Encryption in transit and at rest
All traffic is served over modern TLS. Application data and backups are encrypted at rest by the underlying Azure database service, with additional safeguards applied to the most sensitive fields.
Private network connectivity
Application services reach back-end data over private connectivity rather than the public internet. Administrative access is gated, scoped, and reviewed.
Role-based access & least privilege
Every user is assigned a role; every role is mapped to a precise scope of pages, actions and records. Access is enforced at multiple layers, and access reviews run on a regular cadence.
Audit logging & monitoring
Authentications, record changes and administrative actions are written to immutable audit logs. Telemetry flows into a centralized security platform for continuous review and alerting.
Backups & disaster recovery
Automatic point-in-time restore, plus geo-redundant long-term retention so a regional incident doesn't become a data-loss event. Recovery procedures are documented, tested and runbook-driven.
Continuous threat detection
Continuous detection scans for anomalous logins, data-exfiltration patterns and known vulnerabilities. Alerts route to the on-call security responder in real time.
Inherited compliance
By running on Microsoft Azure, GemCore OS inherits the platform-level certifications Microsoft maintains — including ISO 27001, SOC 1 / SOC 2 / SOC 3, HIPAA, GDPR, CCPA and PCI DSS. Attestations are published through the Microsoft Service Trust Portal.
What this means in practice.
You don't take on a new vendor's security model. You extend the one your team already audits and trusts. Your Microsoft tenant remains the source of truth for identity. Your data stays inside the same enterprise-grade perimeter you've already vetted.
How we operate
For operational reasons, we don't publish detailed architecture, configuration, or vendor names beyond what's above. If your security or vendor-risk team needs deeper diligence — SIG Lite, CAIQ, custom questionnaires, or a walk-through under NDA — we're happy to provide that directly.
Have a security questionnaire to send our way? Email contact@gemcoreos.com and we'll route it to the right person.