Trust & Compliance
CSA STAR Level 1 — CAIQ Self-Assessment
QNSP is listed in the Cloud Security Alliance (CSA) STAR Registry at Level 1 (CAIQ v4.1.0 self-assessment). Level 1 is a public CAIQ self-assessment provided by the vendor.

STAR Level 1
Self-Assessment (CAIQ)
Last Updated: February 23, 2026
ISO Programs (in progress): ISO 9001 (QMS), ISO 14001 (EMS), ISO 45001 (OH&S), ISO 27001 (ISMS), ISO 22301 (BCMS)
Not yet certified. Status and scope vary by program and service.
What This Means
Comprehensive documentation of security controls for IaaS, PaaS, and SaaS services
Industry-accepted framework for cloud security assurance
Publicly accessible assurance artifacts for customer due diligence
About CSA STAR
The Cloud Security Alliance (CSA) Security, Trust, Assurance, and Risk (STAR) Registry is a public registry for cloud security assurance artifacts.
QNSP Platform Coverage:
End-to-end quantum-native security fabric for AI, data, and mission-critical systems with PQC-TLS termination, HSM-integrated KMS, secrets vault, encrypted storage, and full observability.
🎯 Enterprise & Government Customers: Our CSA STAR Level 1 listing provides the transparency and assurance you need for vendor risk assessments. Download our CAIQ self-assessment directly from the CSA STAR Registry.
Quantum imperative
Designed for 2026+ resilience
Multi-tenant Integrated Trust Platform delivering PQC-native security, zero-trust automation, quantum-resistant protection and built-in compliance across all services.
- Private/VPC/sovereign and air-gapped deployments are not shown here.
- Statuses may appear Offline/Degraded due to network connectivity. Refresh to retry. For persistent issues, check your deployment’s /status endpoint or internal monitoring. If you’re using QNSP Cloud, visit https://qnsp.cuilabs.io/status.
Transparent pricing
Simple, predictable pricing for every team
Start free, scale as you grow. All SDKs are free. Enterprise features (enclaves, AI training) available on higher tiers.
Free Forever
FREE
Free-forever for everyone — explore PQC workloads with no time limit
- ✓10 GB PQC-encrypted storage
- ✓50,000 API calls/month
- ✓20 KMS keys (ML-KEM, ML-DSA, SLH-DSA)
- ✓25 vault secrets (read/write)
- ✓PQC TLS on all connections
- ✓Default crypto policy
- ✓7-day audit log retention
- ✓12 SDKs (Included)
- ✓Community support
Developer Plans
DEV STARTER
First paid commitment — build something real
- ✓100 GB PQC-encrypted storage
- ✓100,000 API calls/month
- ✓30 KMS keys
- ✓75 vault secrets
- ✓Default crypto policy
- ✓30-day audit log retention
- ✓12 SDKs (Included)
- ✓Email support (48h response)
DEV PRO
Production PQC stack — keys, vault, SSE, and AI inference
- ✓250 GB PQC-encrypted storage
- ✓500,000 API calls/month
- ✓75 KMS keys, 100K KMS ops/month
- ✓150 vault secrets, 300 secret versions
- ✓SSE-X enabled (PQC-encrypted storage)
- ✓AI inference (non-enclave)
- ✓15 API keys
- ✓12 SDKs (Included)
- ✓Email + Slack Connect support (24h response)
DEV ELITE
Compliance-ready development — CBOM and audit retention
- ✓500 GB PQC-encrypted storage
- ✓750,000 API calls/month
- ✓125 KMS keys, 200K KMS ops/month
- ✓500 vault secrets, 500 secret versions
- ✓SSE-X enabled
- ✓AI inference (non-enclave)
- ✓90-day audit log retention (included)
- ✓25 API keys
- ✓12 SDKs (Included)
- ✓Email + Slack Connect support (12h response)
DEV TEAM
Startup bridge — CBOM included, compliance visibility for growing teams
- ✓1 TB PQC-encrypted storage
- ✓1M API calls/month
- ✓200 KMS keys, 350K KMS ops/month
- ✓600 vault secrets, 1.5K secret versions
- ✓SSE-X enabled
- ✓AI inference (non-enclave)
- ✓90-day audit log retention (included)
- ✓CBOM export (included)
- ✓Quantum readiness report (included)
- ✓35 API keys, 3 portal seats
- ✓12 SDKs (Included)
- ✓Email + Slack Connect support (8h response)
Business Plans
BUSINESS TEAM
Production-grade team tier with compliance reporting and crypto policy UI
- ✓5 TB PQC-encrypted storage
- ✓1.5M API calls/month
- ✓300 KMS keys, 500K KMS ops/month
- ✓1K vault secrets, 3K secret versions
- ✓SSE-X enabled
- ✓CBOM export + Crypto policy enforcement UI
- ✓90-day audit log retention (included)
- ✓50 API keys, 5 portal seats
- ✓12 SDKs (Included)
- ✓Slack Connect support (8h response)
BUSINESS ADVANCED
Strict crypto policy — regulated workloads with compliance evidence
- ✓10 TB PQC-encrypted storage
- ✓7.5M API calls/month
- ✓600 KMS keys, 750K KMS ops/month
- ✓2K vault secrets, 7.5K secret versions
- ✓Strict crypto policy (ML-KEM-768/1024, ML-DSA-65/87)
- ✓180-day audit log retention (included)
- ✓Compliance reports + attestation streaming
- ✓100 API keys, 10 portal seats
- ✓12 SDKs (Included)
- ✓Slack Connect + email support (4h response, named CSM)
BUSINESS ELITE
Full compliance evidence — everything short of enclaves
- ✓15 TB PQC-encrypted storage
- ✓10M API calls/month
- ✓1K KMS keys, 1.5M KMS ops/month
- ✓4K vault secrets, 15K secret versions
- ✓Strict crypto policy
- ✓1-year audit log retention (included)
- ✓Full compliance evidence + observability pack
- ✓200 API keys, 25 portal seats
- ✓12 SDKs (Included)
- ✓Priority support (8×5, 4h response, named CSM)
Enterprise Plans
ENTERPRISE STANDARD
Enclave-secured AI inference with maximum crypto policy
- ✓20 TB PQC-encrypted storage
- ✓15M API calls/month
- ✓2K KMS keys, 7.5M KMS ops/month
- ✓8K vault secrets, 30K secret versions
- ✓🔒 Enclave AI inference (PQC-attested)
- ✓Maximum crypto policy (ML-KEM-1024, ML-DSA-87)
- ✓1-year audit log retention + failover region
- ✓500 API keys, 50 portal seats
- ✓12 SDKs (Included)
- ✓Priority support (8×5, 4h response, named CSM)
ENTERPRISE PRO
Full AI security — training, fine-tuning, inference, all PQC-attested
- ✓25 TB PQC-encrypted storage
- ✓30M API calls/month
- ✓5K KMS keys, 30M KMS ops/month
- ✓20K vault secrets, 100K secret versions
- ✓🔒 Full enclave AI: training, fine-tuning, inference
- ✓Maximum crypto policy
- ✓Full compliance evidence suite
- ✓1K API keys, 100 portal seats
- ✓12 SDKs (Included)
- ✓Premium support (24×7, 1h response, named CSM)
ENTERPRISE ELITE
Fortune 200 & mission-critical — government policy, HSM, unlimited scale
- ✓Unlimited storage & API calls
- ✓Unlimited KMS keys & vault secrets
- ✓🔒 Government crypto policy (FIPS 203/204/205 only)
- ✓🔒 HSM-backed root keys (CloudHSM included)
- ✓🔒 Full enclave AI suite + dedicated GPU clusters
- ✓7-year audit log retention
- ✓Isolated tenancy + failover region
- ✓12 SDKs (Included)
- ✓Custom SLA (99.99% uptime)
- ✓Dedicated CSM + premium support
Mission-Critical Programs
PUBLIC SECTOR
Government & public services programs with regulated procurement
- ✓Custom storage & API limits
- ✓🔒 Controlled deployment options (VPC / private / on-prem)
- ✓Customer/partner-managed HSM integration (certification level depends on selected HSM)
- ✓IL5/FedRAMP High alignment (deployment-specific)
- ✓SOC 2 Type II & ISO 27001 programs (in progress)
- ✓ISO 9001 / ISO 14001 / ISO 45001 / ISO 22301 programs (in progress)
- ✓GDPR, HIPAA & data residency
- ✓12 SDKs (Included)
- ✓Dedicated account manager
- ✓24/7 incident escalation (enterprise agreement)
- ✓Field engineering via customer/partner processes (as required)
DEFENSE & SPACE
Defense, national security, and space agency deployments
- ✓Custom storage & API limits
- ✓🔒 Classified enclave clusters
- ✓🔒 Customer-controlled air-gapped orchestration
- ✓Customer/partner-managed HSM integration (certification level depends on selected HSM)
- ✓ITAR program support (deployment-specific)
- ✓Data residency guarantees (deployment-specific)
- ✓Private cloud & edge deployment
- ✓12 SDKs (Included)
- ✓Dedicated account manager
- ✓24/7 incident escalation (enterprise agreement)
CRITICAL INFRASTRUCTURE & LABS
Nuclear, biosecurity, critical infrastructure, and quantum labs
- ✓Custom storage & API limits
- ✓🔒 High-assurance enclaves + attestation controls
- ✓Customer/partner-managed HSM integration (certification level depends on selected HSM)
- ✓Air-gapped / isolated tenancy options (deployment-specific)
- ✓Compliance alignment (deployment-specific)
- ✓Data residency & retention controls
- ✓Private cloud & edge deployment
- ✓12 SDKs (Included)
- ✓Dedicated account manager
- ✓Field engineering via customer/partner processes (as required)
- Features, functionality, SDKs, and APIs may evolve. Where applicable, changes are communicated through release notes and may be subject to plan-specific feature availability.
- Support and SLA coverage depend on your subscription tier and (for Enterprise) signed agreements. Free/community usage is supported on a best-effort basis.
- “Popular” and “Recommended” indicators are derived from aggregated customer preference signals and live usage analytics.
- Pricing may change over time. Promotional or introductory pricing is subject to change following the applicable promotional period.
Platform
Security Framework
Threat modeling, cryptographic policy enforcement, signed audit trails, and automated incident response—mapped to common enterprise frameworks.
Live PQC-TLS Evidence
Public TLS terminates at the AWS ALB with a PQ/hybrid TLS policy. You can verify negotiated groups and policy evidence via /platform/v1/crypto/tls/evidence/public. Full platform crypto posture is available at /platform/v1/crypto/posture/public(authentication required for full details).
Quantum Threat Model v2.0
Comprehensive threat modeling aligned with NIST PQC standards and CRQC timeline assumptions.
- 6 attacker classes: Opportunistic → Nation-State with CRQC
- HNDL (Harvest Now, Decrypt Later) timeline modeling
- 22 security controls mapped to specific threats
- Data classification: ephemeral → long-lived secrets
- Legacy migration milestones: staged classical deprecation (PQC-Native is the default)
Cryptographic Attestation
Forensic-grade cryptographic evidence with NIST algorithm lifecycle tracking and compliance assessment.
- NIST algorithm registry with lifecycle status (Final/Draft/Deprecated)
- CBOM (Cryptographic Bill of Materials) export with SHA3-256 hash
- Automated CNSA 2.0 and FIPS 140-3 compliance checks
- Policy enforcement: audit mode or hard-block mode
- Migration planning for deprecated algorithms (platform-wide)
- Machine-verifiable compliance snapshots with PQC signatures
Cryptographic Policy Engine
Tenant-configurable PQC enforcement with algorithm allowlists and HSM requirements.
- KEM: ML-KEM-512/768/1024 (FIPS 203), HQC, BIKE, Classic McEliece, FrodoKEM, NTRU
- Signatures: ML-DSA-44/65/87 (FIPS 204), SLH-DSA (FIPS 205), FN-DSA (FIPS 206 draft), MAYO, CROSS, UOV, SNOVA
- Symmetric: AES-256-GCM, ChaCha20-Poly1305
- 90 PQC algorithms across 14 families, 4 policy tiers: Default → Government/Defense
- HSM-enforced root key protection (HSM-backed root keys; certification depends on deployment)
Signed Audit Evidence
Cryptographically signed, hash-chained audit trail for compliance and forensics.
- 30 crypto-critical event types across 7 services
- PQC-signed events with ML-DSA-3 signatures
- SHA3-512 hash chains with Merkle checkpoints
- Severity inference: info → critical
- SIEM/monitoring export (Splunk, Datadog) + 6 additional integrations (Slack, GitHub, AWS, Azure, GCP, Okta) via deployment-specific forwarding
Key Compromise Response
Automated incident response for suspected or confirmed key compromises.
- 5-step remediation: record → rotate → rewrap → revoke → audit
- KMS, Vault, Storage service integration
- Automatic capability token revocation
- 5s per-call timeout with retry for remediation actions
- Correlation tracking across services
Downgrade Attack Remediation
Real-time detection and response to cryptographic downgrade attempts.
- Protocol tracking: PQC-TLS → TLS 1.3 → TLS 1.2
- Algorithm monitoring: ML-DSA → ECDSA downgrades
- Automatic IP/user blocking on critical severity
- Token revocation and resource quarantine
- Escalation to key compromise handler
Platform Capabilities
18 Production Services
Edge Gateway, Auth Service, Vault Service, Storage Service, Search Service, Tenant Service, Billing Service, KMS Service, Audit Service, Access Control Service, Security Monitoring Service, Observability Service, AI Orchestrator, AI Intelligence Service, Crypto Inventory Service, Platform API, Terraform Provisioner, PQC-TLS Canary — all deployed as optimized containers (~85 MB average) to AWS ECR.
Hardware Enclaves
Intel SGX (MEE), AMD SEV (Memory Guard + SEV-SNP), NVIDIA CC (GPU memory encryption), Intel TDX (TME - supports Google Cloud Confidential VMs/GKE), ARM TrustZone, ARM CCA/RME (supports Google Cloud Confidential GKE), AWS Nitro Enclaves, IBM Secure Execution with cryptographic attestation.
Scheduler Backends
Kubernetes (Jobs API), AWS Batch (job queues), GPU Fleet, TPU Fleet (with attestation).
HSM Integration
Thales Luna, Entrust nShield, AWS CloudHSM, Azure HSM (PKCS#11 integration; certification level depends on the selected HSM and customer deployment).
Developer Platform
12 TypeScript SDK/client packages, REST APIs (OpenAPI), WebSocket API, CLI tools, CI/CD usage guides (GitHub Actions, GitLab CI, Jenkins, CircleCI).
Observability & Compliance
OTLP streaming, Merkle tree checkpoints, automated remediation, 8 integration providers (Slack, GitHub, AWS, Azure, GCP, Datadog, Splunk, Okta) via edge gateway, real-time collaboration.
Feature Comparison
Competitor Landscape
Cloud Providers
Cloud providers are rolling out PQC primarily through primitives (KMS, certificates, TLS endpoints) and managed services. This lowers the barrier to adoption, but customers still assemble end-to-end enforcement across ingress, policy, audit evidence, storage/search workflows, and incident automation.
Examples
- PQC primitives in KMS / secrets / certificate services and selected TLS endpoints
- Broad managed service catalogs (storage, search, AI) with varying security/enforcement cohesion
- Identity + policy products exist, but cross-service, evidence-grade enforcement is usually an integration project
Strengths
- Global footprint, managed services, and operational maturity
- PQC exposure through standard interfaces (TLS, KMS) accelerates early adoption
- Compliance programs and enterprise procurement pathways
Gaps
- Often focused on primitives rather than end-to-end tenant policy + audit evidence
- Customers still stitch together ingress enforcement, signed ingestion, retention, and incident automation
- Consistency across services varies; strong outcomes often require additional control-plane buildout
Security Tools
Security tools deliver best-in-class point capabilities (vaults, PAM, edge access, SIEM/SOAR). They can be critical building blocks, but the end-to-end outcome (tenant policy, capability enforcement, signed audit evidence, and secure data workflows) is usually assembled across multiple vendors and systems.
Examples
- Vaults / PAM for secrets and credential rotation
- Edge access + WAF/Zero Trust posture controls
- SIEM/SOAR for monitoring and response automation
Strengths
- Mature deployments for identity/edge/PAM use cases
- Good fit for incremental adoption (swap one control at a time)
- Broad ecosystem integrations
Gaps
- Often focused on one layer rather than cross-service, tenant-scoped enforcement
- Doesn’t typically unify storage/search/AI workflows under a single policy + capability model
- Audit evidence exists, but it’s rarely delivered as a single, tamper-evident platform trail
PQC Tooling
PQC tooling vendors focus on crypto-agility and migration readiness (PKI lifecycle, discovery, HSM options, and PQC primitives). They can accelerate planning and rotation, but typically don’t deliver the full platform surface: secure ingress + signed ingestion, per-tenant policy enforcement, evidence-grade audit, and secure data workflows.
Examples
- Crypto posture / inventory + certificate lifecycle automation
- Hardware-backed key protection options and PQC primitives
- Rotation orchestration for PKI and machine identity surfaces
Strengths
- Deep cryptographic specialization and migration readiness tooling
- Helpful for inventory, policy design, and lifecycle automation at scale
Gaps
- Usually not a full stack for tenants, audit trails, storage/search workflows, or billing/metering
- Integration and operational ownership remains with the customer or SI
Developer platform
Build with quantum-secure infrastructure
TypeScript SDKs and REST APIs (OpenAPI). Free for all tiers. Get started in 5 minutes.
Dev Team is the most requested tier in QNSP history — designed by the community, for the community. A startup bridge at $1,499/month with CBOM, quantum readiness reports, and compliance visibility included from day one.
Sign up free
Create your account at cloud.qnsp.cuilabs.io and provision your tenant in minutes
Install SDK
SDK install and usage instructions are provided in the documentation portal
Upload your first document
Use QNSP APIs to upload documents with quantum-secure encryption
Build your app
Integrate QNSP into your application with full PQC protection
Available SDK packages
@qnsp/storage-sdkAvailableDocument upload/download, lifecycle management, compliance controls
@qnsp/search-sdkAvailableFull-text search, SSE token filtering, index optimization
@qnsp/ai-sdkAvailableAI workload orchestration, enclave management, GPU scheduling
@qnsp/auth-sdkAvailableAuthentication, FIDO2 passkeys, Personal Access Tokens (PATs), session management
@qnsp/vault-sdkAvailableSecrets management, credential storage, lease rotation
@qnsp/tenant-sdkAvailableTenant management, subscription, metadata operations
@qnsp/billing-sdkAvailableInvoice management, usage tracking, payment processing
@qnsp/access-control-sdkAvailablePolicy management, capability tokens, authorization flows
@qnsp/audit-sdkAvailableAudit log querying, compliance reporting, event retrieval
@qnsp/kms-clientAvailablePQC envelope encryption client, BYOK workflows, signing helpers
@qnsp/crypto-inventory-sdkAvailableCrypto asset discovery, PQC migration tracking, inventory management
@qnsp/browser-sdkAvailableBrowser-compatible PQC encryption: client-side encryption, signing, key encapsulation
SDK access and install guidance is provided in the documentation portal.
API access (Edge Gateway)
https://api.qnsp.cuilabs.io/auth/v1/tenant/v1/billing/v1/storage/v1/vault/v1/kms/v1/search/v1/ai/v1/platform/v1Health check: /health
Use cases
Real workloads, developer stories, and why now
Reference architectures, production patterns, and external standards show how QNSP lands in AI labs, gov clouds, and zero-trust programs.
Real workloads
Universal Free Forever Access
QNSP Cloud stays free forever for everyone—from individual users to global enterprises—starting with PQC storage and the full developer toolkit (12 SDK/client packages), with 10 GB storage, 50,000 API calls monthly, 20 KMS keys, and 25 vault secrets.
Kick off proofs of concept or production pilots immediately without credit cards, procurement reviews, or contracts.
Sovereign AI labs
Encrypted model training pipelines in customer-controlled sovereign cloud/VPC/on-prem environments, with GPU enclave orchestration and PQC-signed inference APIs.
Zero plaintext exposure of training sets with PQC-signed inference APIs.
Defense & intelligence
Customer-controlled private or air-gapped deployments with offline signing, distributed edge routing, tamper-evident audit flows.
Automated revocation workflows and tamper-evident audit replay.
Regulated finance
Quantum-safe document vaults, searchable encryption, automated retention + legal hold APIs.
PQC compliance with immediate regulator reporting via audit service webhooks.
Healthcare & life sciences
PHI-safe storage, secure collaboration, PQC-authenticated research data exchanges.
Meets HIPAA + GDPR residency through data-layer policying.
Developer stories
LegalTech contract management
Store thousands of contracts with long-term retention, search across clauses, and run AI contract analysis with immutable audit trails.
Unified storage + search + AI workflows with compliance-grade evidence and legal holds.
Healthcare patient record systems
Protect PHI with encrypted storage, HIPAA-aligned audit trails, and secure search across records with de-identification controls.
Retention, legal holds, and tenant isolation built into the platform primitives.
Investment & broker-dealer archives
WORM-style retention policies, immutable audit trails, and searchable encryption for investment documents and compliance reporting.
Regulator-ready retention and audit workflows without bespoke infrastructure.
Multi-tenant B2B document platform
Self-serve onboarding, tenant-isolated storage and search, and usage metering for billing across thousands of customer workspaces.
Ship faster by outsourcing encryption, compliance controls, and tenant isolation.
EdTech secure LMS
Securely store coursework and student submissions with privacy-safe search and long retention windows for transcripts and records.
FERPA-aligned handling through classification, retention, and tenant isolation patterns.
GovTech public records management
Manage public records with controlled access, immutable audit logs, and retention policies aligned to FOIA-style workflows.
Tamper-evident audit trails with policy-driven storage and selective indexing.
Why now
NIST post-quantum cryptography standards
NIST finalized FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA), encouraging organizations to begin transitioning.
Read reference →Confidential computing for secure AI pipelines
Trusted execution environments (TEEs) protect data, models, and computations across preprocessing, training, and inference with attestation-based verification.
Read reference →Engage
Start Building with QNSP
Join organizations deploying quantum-native security across cloud, private, and sovereign environments.
Business & Enterprise
Move beyond self-serve with a guided rollout plan for teams, production workloads, and higher-throughput integrations.
Mission-Critical Sectors
Custom deployments for regulated industries, defense, critical infrastructure, and sovereign environments with security-first delivery and dedicated support.
Developer Resources
Explore comprehensive documentation, API references, and integration guides to accelerate your quantum-native security implementation.
Get in Touch
FAQ
Frequently Asked Questions
Common questions about QNSP's quantum-native security platform, deployment options, and technical capabilities.
