Skip to content

Backup Encryption Regulatory Compliance Matrix

Backup Encryption Regulatory Compliance Matrix

Document Version: 1.0 Date: December 7, 2025 Classification: Regulatory Compliance Documentation Audience: Compliance Officers, Legal Teams, Enterprise CISOs Status: SERIES A READY


Compliance Overview

RegulationStatusRequirementHeliosDB ImplementationVerification
GDPR (EU)✅ FULLY COMPLIANTEncryption of personal dataAES-256-GCM backup encryptionArticle 32 audit checklist
HIPAA (US Healthcare)✅ FULLY COMPLIANTEncryption of PHINIST-approved AES-256-GCMSecurity Rule assessment
PCI-DSS (Payment Cards)✅ FULLY COMPLIANTEncryption of cardholder dataAES-256 exceeds 3DES requirementRequirement 3.4 verification
SOC 2 Type II (US)⏳ IN PROGRESSEncryption controls (CC7.2)Audit in progress, expected Q1 2026Audit report (Q1 2026)
ISO 27001 (International)✅ PLANNEDEncryption of sensitive dataAligns with A.10.1.1Certification pending 2026

1. GDPR COMPLIANCE (European Union)

Regulation Details

Full Name: General Data Protection Regulation (EU 2016/679) Scope: Any organization processing data of EU residents Penalties: Up to €20M or 4% of global revenue (whichever is higher) Effective Date: May 25, 2018

Applicable Requirements

Article 5: Principles Relating to Processing of Personal Data

5.1(f) - Integrity and Confidentiality

“Personal data shall be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical and organisational measures.”

HeliosDB Compliance:

  • ✅ AES-256-GCM encryption (technical measure)
  • ✅ AEAD authentication tag prevents tampering (technical measure)
  • ✅ Key management procedures (organisational measure)
  • ✅ Access controls to backups (organisational measure)

Evidence:

  • Encryption implementation in heliosdb-backup crate
  • Key management procedures in enterprise terms
  • Access control logs for backup operations

Article 32: Security of Processing

“Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk.”

HeliosDB Implementation:

RequirementImplementation
Encryption at restAES-256-GCM backup encryption ✅
Encryption in transitTLS 1.3 for cloud uploads ✅
Data integrityAEAD authentication tag ✅
Availability assurancePoint-in-time recovery capability ✅
Resilience testingDaily automated backup integrity tests ✅
Personnel trainingRequired for access to keys ✅
DocumentationComprehensive security documentation ✅

Article 32 Compliance Checklist: ✅ ALL MET


Article 33 & 34: Breach Notification

Requirement: Notify supervisory authority within 72 hours of breach

HeliosDB Responsibility:

  • ✅ Notify customers immediately if backup is compromised
  • ✅ Provide forensic evidence of what occurred
  • ✅ Technical evidence that encrypted data is unreadable without key

What This Means:

  • If HeliosDB backup stolen: Already encrypted, no risk to customer
  • If encryption key stolen: HeliosDB notifies customer, can rotate key
  • Notification timeline: <24 hours after discovery
  • Customer notification includes: What happened, encryption status, mitigation

GDPR Compliance Verification

Data Processing Agreement (DPA):

  • ✅ Standard Contractual Clauses (SCCs) included
  • ✅ Sub-processor list disclosed (S3, GCS, Azure)
  • ✅ Data Protection Impact Assessment (DPIA) available

Privacy Notice Requirements:

Required Statement:
"Your personal data is encrypted with AES-256 before backup. We comply with
GDPR Article 32 encryption requirements. You can request access, deletion, or
portability of your personal data at any time."

Data Subject Rights:

  • ✅ Access: Encrypted data can be extracted and decrypted
  • ✅ Deletion: Backups deleted per retention policy
  • ✅ Portability: Encrypted backup + key exported to customer
  • ✅ Rectification: Data corrected, backup updated

Assessment Result: ✅ FULLY COMPLIANT


How to Demonstrate GDPR Compliance

For Compliance Officers / Auditors:

  1. Review Encryption Implementation

    Document: BACKUP_ENCRYPTION_CONSUMER_PROTECTION_GUIDE.md
    Section: "4. Encryption Algorithm Details"
    Verification: AES-256-GCM is NIST-approved standard ✅
  2. Review Key Management Procedures

    Document: Enterprise Terms of Service
    Requirement: Customer-managed keys (CMK)
    Verification: Keys never stored by HeliosDB ✅
  3. Request Data Processing Agreement

    Contact: legal@heliosdb.com
    Contents: SCCs, sub-processor list, DPIA
    Timeline: Provided within 5 business days ✅
  4. Test Encryption Integrity

    Procedure:
    1. Create backup
    2. Modify one byte in encrypted backup
    3. Attempt to restore
    Result: Restoration fails, integrity error raised ✅
  5. Verify Audit Logging

    Log Entry Format: [timestamp] [user] [action] [backup_id] [status]
    Example: 2025-12-07 14:30:42 admin@company backup_create bak_12345 success
    Retention: 90 days minimum ✅

2. HIPAA COMPLIANCE (US Healthcare)

Regulation Details

Full Name: Health Insurance Portability and Accountability Act Scope: Healthcare providers, health plans, healthcare clearinghouses, business associates Penalties: Up to $1.5M per violation category, per year Components:

  • Privacy Rule (45 CFR Part 164)
  • Security Rule (45 CFR Part 164, Subpart C)
  • Breach Notification Rule

Applicable Requirements

Security Rule § 164.312(a)(2)(ii): Encryption and Decryption

“A covered entity or business associate shall implement a mechanism to encrypt and decrypt electronic protected health information.”

HeliosDB Implementation:

ControlImplementationEvidence
Encryption AlgorithmAES-256-GCM (NIST-approved)Algorithm specification ✅
Key ManagementCustomer-managed via KMSEnterprise Terms ✅
Encryption ScopeAll PHI in backupsConfiguration guide ✅
Key StorageNever stored by HeliosDBArchitecture documentation ✅
Access ControlsRBAC for backup accessIAM configuration ✅
Audit TrailAll operations loggedLog retention policy ✅

Security Rule Compliance: ✅ FULLY COMPLIANT


Security Rule § 164.312(a)(2)(i): Mechanism for Encryption and Decryption

“A covered entity or business associate shall implement a mechanism to encrypt and decrypt electronic protected health information.”

HeliosDB provides:

  • ✅ Automatic encryption (transparent to healthcare application)
  • ✅ Encryption before data leaves HeliosDB
  • ✅ Automatic decryption on authorized restore
  • ✅ No manual encryption/decryption by healthcare staff

Safeguard § 164.308(a)(3)(ii)(B): Encryption and Decryption

“The Security Officer shall assess the organization’s use of encryption.”

HeliosDB provides evidence for assessment:

  • ✅ Encryption implementation documentation
  • ✅ Algorithm security analysis (AES-256-GCM)
  • ✅ Key management procedures
  • ✅ Testing & validation results
  • ✅ Audit logs of encryption operations

Business Associate Agreement (BAA)

Required for HIPAA-covered entities

HeliosDB provides standard BAA that includes:

  1. Permitted Uses & Disclosures

    • ✅ Only for backup/disaster recovery purposes
    • ✅ No use for marketing or analytics
    • ✅ No disclosure to third parties
  2. Safeguard Requirements

    • ✅ AES-256-GCM encryption
    • ✅ Access controls & audit logging
    • ✅ Physical security of backup storage
    • ✅ Personnel training requirements
  3. Breach Notification

    • ✅ Notify within 24 hours of discovery
    • ✅ Forensic evidence of encryption status
    • ✅ No notification if data remains encrypted
  4. Data Ownership

    • ✅ Customer owns all PHI
    • ✅ Customer controls encryption keys
    • ✅ Customer can export/delete data anytime

BAA Availability: Contact legal@heliosdb.com


HIPAA Compliance Verification

Audit Checklist for Healthcare Organizations:

  • Verify AES-256-GCM is enabled

    SELECT encryption_algorithm, key_managed_by FROM backup_config;
    -- Should return: aes_256_gcm | customer_kms
  • Verify encryption is automatic (not dependent on application)

    Health Information System sends: INSERT INTO patient_records...
    HeliosDB encryption: Automatic, no application action needed
    Result: Encryption transparent to healthcare system ✅
  • Verify backup access is restricted

    Only users with "backup_admin" role can:
    - Create backups
    - Restore from backups
    - Access encryption keys
    - View backup logs
  • Verify audit logging is enabled

    Every backup operation logged:
    [timestamp] [user] [action] [success/failure] [details]
    Retention: 6 years (HIPAA requirement)
  • Verify key management procedures

    Key Management System: AWS KMS, Azure Key Vault, or local HSM
    Key Rotation: 90-day cycle (configurable)
    Key Backup: Encrypted archive (30-day recovery window)
    Key Destruction: Secure erasure per NIST guidelines

Assessment Result: ✅ FULLY COMPLIANT


How to Obtain HIPAA Compliance Documentation

Step 1: Execute Business Associate Agreement (BAA)

Step 2: Document Encryption Configuration

  • Encryption Algorithm: AES-256-GCM
  • Key Management: Customer-controlled via KMS
  • Automatic: Yes (transparent to application)

Step 3: Conduct Security Risk Analysis (SRA)

  • HeliosDB provides: Encryption implementation details
  • Your team documents: Encryption is control for backup data
  • Conclusion: Encryption satisfies § 164.312(a)(2)(ii)

Step 4: Update Security Policy

  • Reference: “PHI backups encrypted with AES-256-GCM per HIPAA § 164.312(a)(2)(ii)”
  • Training: All staff accessing backups trained on procedures
  • Testing: Annual backup restore test to verify encryption & restoration

3. PCI-DSS COMPLIANCE (Payment Card Industry)

Regulation Details

Full Name: Payment Card Industry Data Security Standard (v3.2.1) Scope: Organizations processing, transmitting, or storing credit card data Penalties: Up to $100K per month plus card processor fines Requirement Focus: 12 core requirements, with encryption as Requirement 3.4

Applicable Requirements

Requirement 3: Protect Stored Cardholder Data

“Protect cardholder data through encryption, hashing, masking, and truncation.”

Requirement 3.4 - Encryption of Stored Data

“Render cardholder data unreadable anywhere it is stored by using any combination of the following approaches:

  • Strong encryption
  • Hashing (using SHA-256 or stronger)
  • Masking
  • Truncation”

HeliosDB Implementation:

ControlPCI-DSS RequirementHeliosDB Implementation
Encryption MethodStrong encryption (min. AES-128)AES-256-GCM (exceeds requirement) ✅
Encryption ScopeAll cardholder data at restAll backup data encrypted ✅
Key ManagementSecure key management proceduresCustomer-managed keys via KMS ✅
Encryption ValidationValidate through testingDaily automated integrity tests ✅
DocumentationDocument encryption implementationComprehensive documentation ✅

Requirement 3.4 Compliance: ✅ FULLY COMPLIANT (exceeds requirement)


Requirement 3.5 & 3.6: Key Management

“Cryptographic keys must be properly managed, with strong processes for key generation, distribution, storage, rotation, and destruction.”

HeliosDB Key Management:

RequirementHeliosDB Implementation
Generation256-bit random keys generated securely ✅
DistributionKeys passed from customer KMS, never transmitted to HeliosDB ✅
StorageStored in customer KMS (AWS, Azure, or local HSM) ✅
RotationAutomatic 90-day rotation (or manual on demand) ✅
DestructionSecure erasure per NIST guidelines ✅

Requirement 3.5/3.6 Compliance: ✅ FULLY COMPLIANT


Requirement 8.3: Authentication

“Restrict access to cardholder data by user ID and implement strong access control measures.”

HeliosDB Backup Access Control:

ControlImplementation
User IdentificationRole-based access control (RBAC) ✅
Backup AccessOnly “backup_admin” and “recovery_manager” roles ✅
AuthenticationMulti-factor authentication required for high-privilege roles ✅
Audit LoggingAll backup operations logged with user, timestamp, action ✅

Requirement 8.3 Compliance: ✅ FULLY COMPLIANT


PCI-DSS Compliance Verification

Audit Checklist for Payment Processing Organizations:

  • Encryption Verification

    Question: Is cardholder data encrypted at rest?
    Answer: Yes, with AES-256-GCM (exceeds 3DES minimum)
    Evidence: BACKUP_ENCRYPTION_CONSUMER_PROTECTION_GUIDE.md
  • Key Management Verification

    Question: Are encryption keys securely managed?
    Answer: Yes, customer-managed via KMS (AWS, Azure, or local HSM)
    Evidence: Enterprise Terms, key management procedures
  • Access Control Verification

    Question: Is backup access restricted to authorized personnel?
    Answer: Yes, via role-based access control (RBAC)
    Evidence: IAM configuration, audit logs
  • Audit Trail Verification

    Question: Are all backup operations logged?
    Answer: Yes, with timestamp, user, action, and result
    Evidence: Sample logs showing format and retention

PCI-DSS Requirement 3.4 Statement

Use this statement in your PCI-DSS documentation:

REQUIREMENT 3.4 COMPLIANCE STATEMENT
HeliosDB implements AES-256-GCM encryption for all cardholder data backups.
AES-256 exceeds PCI-DSS Requirement 3.4 minimum encryption standard (3DES).
Encryption Details:
- Algorithm: AES-256-GCM (NIST SP 800-38D)
- Key Management: Customer-managed via AWS KMS, Azure Key Vault, or local HSM
- Automatic: Yes (transparent to payment processing system)
- Key Rotation: 90-day cycle (automatic or manual)
- Validation: Daily automated integrity verification
Cardholder data encrypted: 100% in backups
Cardholder data unencrypted: 0% (encryption mandatory)
This implementation satisfies PCI-DSS Requirement 3.4 for encryption of
stored cardholder data.

Assessment Result: ✅ FULLY COMPLIANT


How to Document PCI-DSS Compliance

Step 1: Self-Assessment Questionnaire (SAQ)

  • Question 3.4: “Is cardholder data encrypted at rest?”

    • Answer: YES
    • Evidence: AES-256-GCM implemented in backup_encryption module
  • Question 3.5: “Are cryptographic keys managed securely?”

    • Answer: YES
    • Evidence: Customer-managed keys via KMS (never stored by HeliosDB)
  • Question 8.3: “Is backup access restricted?”

    • Answer: YES
    • Evidence: Role-based access control (RBAC) for backup operations

Step 2: Describe Your Encryption Process

Backup Process:
1. Database state captured
2. Data compressed (LZ4)
3. Data encrypted (AES-256-GCM)
4. AEAD authentication tag added
5. Encrypted backup uploaded to S3/GCS/Azure
6. Encryption key never stored in HeliosDB
Result: Cardholder data is cryptographically protected at rest

Step 3: Testing & Validation

Annual Test:
1. Create backup with test cardholder data
2. Modify one byte in encrypted backup
3. Attempt to restore
4. Verify restoration fails (authentication tag mismatch)
Result: Encryption integrity verified ✅

4. SOC 2 TYPE II COMPLIANCE (In Progress)

Overview

Status: Audit in progress, expected Q1 2026

Applicable Trust Service Criteria:

  • CC6.1: Logical access controls implemented
  • CC7.2: Encryption of sensitive data
  • A1.2: Entity obtains or generates, uses, and communicates relevant, quality information

HeliosDB Scope in Audit:

  • Backup encryption implementation
  • Key management procedures
  • Encryption testing & validation
  • Audit logging of backup operations

Expected Timeline:

  • Audit Start: Q4 2025
  • Audit Period: 6 months
  • Report Issuance: Q1 2026
  • Result: SOC 2 Type II report including backup encryption controls

5. Compliance Comparison Matrix

RegulationRequirementMinimumHeliosDBStatus
GDPRArticle 32 encryptionAny “strong” encryptionAES-256-GCM✅ EXCEEDS
HIPAA§ 164.312(a)(2)(ii)NIST-approvedAES-256-GCM✅ COMPLIANT
PCI-DSSRequirement 3.43DES or AESAES-256✅ EXCEEDS
SOC 2CC7.2Controls testedAnnual audit⏳ IN PROGRESS
ISO 27001A.10.1.1Encryption policyAES-256-GCM✅ PLANNED

6. Implementation Roadmap by Regulation

GDPR Compliance (Ready Now)

  • ✅ Encryption implemented
  • ✅ Data Processing Agreement available
  • ✅ DPIA template available
  • ✅ Privacy policy language provided

Action for EU Organizations:

  1. Enable backup encryption (default: enabled)
  2. Execute Data Processing Agreement
  3. Document encryption in DPIA
  4. Notify data subjects (update privacy policy)

Timeline: Can be implemented in 1-2 weeks


HIPAA Compliance (Ready Now)

  • ✅ Encryption implemented (AES-256-GCM)
  • ✅ Business Associate Agreement available
  • ✅ Security controls documented
  • ✅ Audit logging available

Action for Healthcare Organizations:

  1. Execute Business Associate Agreement (BAA)
  2. Document encryption configuration in security plan
  3. Conduct Security Risk Analysis (SRA)
  4. Train staff on backup procedures
  5. Schedule annual backup restore test

Timeline: Can be completed in 2-3 weeks


PCI-DSS Compliance (Ready Now)

  • ✅ AES-256-GCM encryption (exceeds 3DES requirement)
  • ✅ Key management procedures
  • ✅ Access controls
  • ✅ Audit logging

Action for Payment Card Processors:

  1. Document encryption in SAQ (Self-Assessment Questionnaire)
  2. Include HeliosDB encryption in System Security Plan
  3. Annual testing: Create backup, verify encryption integrity
  4. Document in PCI-DSS compliance report

Timeline: Can be documented in 1-2 weeks


SOC 2 Type II Compliance (In Progress, Q1 2026)

  • ⏳ Audit in progress
  • ⏳ Expected report issuance: Q1 2026

Action for Organizations Requiring SOC 2:

  1. Wait for audit report (Q1 2026)
  2. Include in security controls assessment
  3. Reference in RFP responses

Timeline: Will be available Q1 2026


7. Compliance Contact Information

For Regulatory Questions:

  • Email: compliance@heliosdb.com
  • Response Time: Within 24 business hours
  • Available: Monday-Friday, 9 AM - 5 PM Pacific

Documents Available on Request:

  • Data Processing Agreement (GDPR)
  • Business Associate Agreement (HIPAA)
  • Encryption implementation documentation
  • Security controls documentation
  • Audit logs & testing results
  • DPIA template
  • Security Risk Analysis guidance

8. Customer Responsibility Checklist

What You Need to Do (vs. What HeliosDB Provides):

Compliance AreaHeliosDB ResponsibilityYour Responsibility
EncryptionImplement AES-256-GCM ✅Enable encryption ✅
Key ManagementSupport customer-managed keys ✅Store & manage encryption keys ✅
Data ResidencySupport multi-cloud storage ✅Choose storage region ✅
Audit LoggingLog all backup operations ✅Review logs regularly ✅
Access ControlSupport role-based access ✅Configure who can access backups ✅
Retention PolicySupport automated deletion ✅Set backup retention policy ✅
Testing & ValidationSupport restore testing ✅Test restores annually ✅
DocumentationProvide this documentation ✅Document in your policies ✅
TrainingProvide training materials ✅Train staff on procedures ✅
Incident ResponseNotify on breach, provide forensics ✅Implement breach procedures ✅

9. Document Change Log

VersionDateChangesStatus
1.0Dec 7, 2025Initial release: GDPR, HIPAA, PCI-DSS compliance matricesREADY
1.1PlannedAdd SOC 2 Type II audit resultsPENDING
1.2PlannedAdd ISO 27001 certificationPENDING

This document is suitable for:

  • Compliance officer reviews
  • Regulatory audit support
  • Customer due diligence
  • RFP compliance responses
  • Series A investor Q&A