Enterprise-grade safeguards for every MafutaAI workload
Our marketplace is built for regulated teams that need predictable isolation, verifiable controls, and humans who respond when seconds matter. Below is the security stack that protects GPUs, data, contributors, and billing flows.
Reach the rotation any time via ops@mafutai.co.za or the console > Support menu. Severity 1 incidents wake an engineer, an incident commander, and our compliance officer.
15 minute acknowledgement target for Sev1 / Sev2 tickets
Joint tabletop exercises offered quarterly
Signed post-incident reports within five business days
Defense in depth
Controls span hardware, software, people, and process so a single failure never compromises our customers.
Hardened infrastructure
Bare metal hosts ship with CIS Level 1 baselines, signed updates, and drift detection so customer workloads always boot on a known-good image.
Single-tenant GPU leases with dedicated NVMe and RAM
Secure boot, TPM-backed attestation, and immutable kernel modules
Ephemeral disks are shredded via blkdiscard immediately after release
Network & access isolation
Every provider node sits behind a WireGuard overlay and per-instance firewalls enforced by eBPF, giving us deterministic networking paths and audit trails.
Mandatory MFA + FIDO2 for the console and API keys
Customer SSH keys scoped per instance with forced command restrictions
No inbound management ports are exposed to the public Internet
Data stewardship
Secrets, telemetry, and chat content move across TLS 1.3 and land inside encrypted storage pools located solely in South Africa.
AES-256-GCM at rest with per-lease envelope keys
HashiCorp Vault backed by HSMs for API keys and provider credentials
Audit trails are hashed hourly and retained for a minimum of 12 months
Operational readiness
A pager-backed security desk owns 24/7 monitoring, tabletop-tested runbooks, and joint incident reviews with customers.
Dedicated rotations with <15 minute acknowledgement targets
Quarterly penetration tests plus continuous software composition analysis
Dual-control change management for infrastructure and billing flows
Customer assurances
Each promise is documented in our contracts and validated by telemetry you can review in real time.
Assured isolation
GPU leases are single tenant, and every teardown wipes VRAM, NVMe, and tmpfs before a new workload can boot.
Ephemeral OS imagesAutomated tamper logs
Data residency
Compute stays inside Johannesburg and Cape Town metros to meet POPIA, CPA, and local data-sovereignty requirements.
Regional failoverResidency attestation on request
Provider vetting
Every provider passes KYC, proof-of-hardware checks, and AML screening before their GPUs hit the marketplace.
Hardware probesDocumented payout audits
Transparent logging
Customers can stream real-time access logs, console actions, and billing events or request an immutable export for compliance.
Webhook fan-outSHA-256 log sealing
Security control layers
Designed for auditors and engineers alike—understand what is enforced by default and where you can plug in your own tooling.
Identity & access
SAML/SCIM integrations, enforced MFA, and role-scoped API keys ensure that only approved operators ever touch production workloads.
Org-level MFASAML + SCIMRotating API keys
Secure delivery
Golden container templates, SBOM tracking, and attested kernel modules stop supply-chain drift before it reaches customers.
Signed templatesSBOM diffsRegistry scanning
Runtime insight
Fleet metrics, Prometheus exporters, and a managed SIEM feed our SOC so anomaly detection happens within minutes, not hours.
SIEM correlationeBPF telemetryPrometheus hooks
Support & compliance
Dedicated POPIA and AML officers partner with engineering to review changes, document controls, and keep audit evidence up to date.
POPIA readyAML screeningQuarterly reviews
Incident response blueprint
Runbooks follow NIST 800-61 and South African regulatory timelines. Customers are looped in from the very first alert.
Detect & confirm
Alerts flow into a managed SIEM with machine learning correlation and a human on-call covering 24/7. Target triage time is <5 minutes.
Contain
We isolate the affected GPU, revoke API tokens, snapshot volatile evidence, and notify customer owners immediately.
Eradicate & recover
Fresh images are provisioned, Vault material is rotated, and forensic artifacts stay sealed for regulators and customer review.
Notify & learn
POPIA/CPA breach windows (72 hours) are baked into our runbooks. We share timelines, mitigations, and next steps after every event.
Contact and escalation channels
Choose whichever path suits the severity of your request. Each channel is logged and tracked.