Enterprise Edition — Available Now

Security intelligence
for regulated environments.

Cloud scanning (AWS / GCP / Azure), compliance mapping, Docker scan isolation, and air-gapped deployment. Built for teams that need audit-ready security — with zero data leaving your infrastructure.

Three tiers for every team size. All include the full Enterprise feature set — cloud scanning, compliance engine, Docker isolation, air-gapped deployment, and ZDE policy. Annual invoicing · net-30 · volume discounts available.

Base
$2,000/yr
Up to 5 seats / scanning nodes
  • Full Enterprise feature set
  • Email support
  • Onboarding call included
  • Volume discount > 5 nodes
Buy Now →
Scale
$10,000+/yr
Unlimited seats · custom SLA · custom plugins
  • Everything in Growth
  • Dedicated support engineer
  • 4-hour critical · 24-hour standard
  • Custom plugin development
Buy Now →
All tiers include everything in Pro ($49/mo) · Compare all plans → · Custom requirements? enterprise@nsasoft.us
☁️

Cloud Scanners

AWS security groups + IAM, GCP firewall rules + IAM bindings, Azure NSGs + RBAC. Uses your own credentials — nothing touches Nsasoft.

📋

Compliance Engine

Map findings to NIST CSF, CIS Controls, HIPAA Security Rule, GDPR Art. 32, and PCI DSS. Gap reports with evidence references.

🐳

Docker Scan Isolation

Each scan runs in an ephemeral container — isolated, parallel, destroyed after completion. Read-only filesystem with resource limits.

🔐

Zero Trust Assessment

Evaluate segmentation boundaries, encryption-in-transit, identity posture, and lateral movement risk. Composite readiness score.

✈️

Air-Gapped Deployment

Docker images (amd64 + arm64), offline NVD feed bundles, and installation tarballs. Runs in fully isolated networks.

🛡️

ZDE Policy Engine

Data classification (public / internal / sensitive / secret), external call guard, policy-based redaction, and full audit logging.

🗄️

Enterprise CTEM

PostgreSQL backend, unlimited scan history retention, query API for historical analysis, and compliance dashboards.

🔍

AWS IAM Deep Auditor (Plugin 030)

Transitive shadow-admin path detection — including PassRole privesc and group-inherited cross-principal chains. Every finding carries a verifiable [via policy: ARN] evidence trail with partialProvenance / provenanceComplete completeness signals for SOC 2 Type-II auditors.

📡

AWS CloudTrail Operational Integrity Auditor (Plugin 1040) new in 0.3.7 / hardened in 0.3.8

Audits CloudTrail trail health (multi-region default-ON across 36 canonical AWS regions, log-file validation, KMS-CMK, IsLogging), CloudWatch alarm coverage against CIS AWS Foundations Benchmark v1.5 §3.1–3.14 via the v2 metric-filter audit, AWS Config recorder + Organizations ConfigurationAggregator detection with deterministic STS account-coverage cross-reference, and cross-account S3 trail-destination WORM verification (Object Lock + Versioning + MFADelete per trail bucket) for SEC 17a-4 / FINRA 4511 retention evidence. Closes SOC 2 CC7.2 + CC7.3.

🚪

AWS API Gateway Assurance Auditor (Plugin 1050) new in 0.3.9

First entry-point evidence plugin for AWS Serverless-Framework deployments. Audits REST APIs (v1) + HTTP APIs (v2): per-method/route authorization classifier (NONE = CRITICAL, AWS_IAM / Cognito / JWT = PASS, JWT-with-wildcard-audience = INFO with IdP issuer/audience evidence, Lambda authorizer = INFO with manual-verification prompt), TLS policy with worst-policy tracking across mixed-config v2 domains (TLS_1_0 = HIGH), stage-level access logging, throttling (A1.2), and WAF association. SOC 2 mapping: CC6.1 + CC6.6 + CC6.7 + CC7.1 + A1.2.

🔏

AWS DynamoDB Audit Integrity Auditor (Plugin 1060) new in 0.3.9 · matrix-shift release

The "audit-the-auditor" plugin — answers the question every Type-II auditor asks after the entry-point one: can the audit record itself be tampered with? Per-table PITR + deletion protection (worst-case CRITICAL "audit record itself not survivable" when both missing). KMS-CMK classifier with conservative LOW-unverifiable posture on :key/UUID ARN shapes (defers to kms:DescribeKey cross-reference rather than false-clean PASS). Resource-policy presence audit via the 2024 GetResourcePolicy API with soft-degrade. CloudTrail DynamoDB data-event coverage cross-reference (orthogonal composition with plugin 1040). Matrix shift: PI1.5 (Stored items) moves out-of-scope → partial. Mapping: CC6.6 + CC7.1 + C1.1 + PI1.5.

🔌

Enterprise MCP Tools

Extended Model Context Protocol tools for AI assistants: start_assessment, compliance_check, export_report.

Standard (npm) Requires nsauditor-ai v0.1.30+ · Node 20+
1 · Authenticate with npm (token included in your purchase email)
# @nsasoft/nsauditor-ai-ee is a private (restricted) package.
# Use the npm read-token delivered with your license email.
npm config set //registry.npmjs.org/:_authToken npm_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

# Or, project-scoped, in an .npmrc file
echo "//registry.npmjs.org/:_authToken=npm_xxxx..." >> ~/.npmrc
2 · Install CE platform + Enterprise package
npm install -g nsauditor-ai @nsasoft/nsauditor-ai-ee
3 · Activate your license — one command, no shell-rc edits
# CE 0.1.30+ verifies the JWT signature before persisting
# and stores the key in macOS Keychain (or ~/.nsauditor/.env mode 0600 on Linux/Windows).
nsauditor-ai license install enterprise_eyJhbGciOiJFUzI1NiIs...

 Enterprise license installed
  Stored at: macOS Keychain (service=nsauditor-ai)
  Org: you@example.com   Seats: 5
  Expires: 2027-04-04T...

# CI/CD alternative: env var still works (highest priority in the multi-source loader)
export NSAUDITOR_LICENSE_KEY=enterprise_eyJ...
4 · Verify activation
nsauditor-ai license --status
 Enterprise license active | Org: you@example.com | Seats: 5 | Expires: 2027-04-04

nsauditor-ai license --capabilities
 intelligenceEngine   riskScoring    complianceEngine
 cloudScanners        zeroTrust      dockerIsolation
5 · Run your first enterprise scan
# SOC 2 compliance scan with auditor-grade evidence artifacts (on-prem network)
nsauditor-ai scan --host 10.0.0.0/24 --plugins all \
  --compliance soc2
For AWS / Azure / GCP recipes, see the Cloud audit samples section below.

The same Enterprise binary scans AWS, Azure, and GCP via cloud-native plugins and writes findings into the unified soc2.json evidence ledger. 10 covered + 4 partial AICPA TSC controls across AWS (S3 + IAM + CloudTrail/CloudWatch/Config + API Gateway + DynamoDB), Azure (RBAC + NSG + Storage), and GCP (firewall + IAM). CC7.2 + CC7.3 transitioned from partial to covered in EE 0.3.7 via the new 1040 AWS CloudTrail Operational Integrity Auditor; institutional-grade hardening shipped in 0.3.8 (v2 metric-filter audit, multi-region default-ON, SEC 17a-4 / FINRA 4511 trail-bucket WORM verification). EE 0.3.9 ships two new plugins — 1050 AWS API Gateway Assurance (first entry-point evidence for Serverless-Framework deployments) and 1060 AWS DynamoDB Audit Integrity ("audit-the-auditor"; PI1.5 Stored items partial — first SOC 2 Processing Integrity evidence stream).

AWS — full SOC 2 audit (plugins 1020 + 1030 + 1040 + 1050 + 1060)
CLOUD_PROVIDER=aws AWS_REGION=us-east-1 \
  nsauditor-ai scan --host aws --plugins 1020,1030,1040,1050,1060 \
    --compliance soc2 --out tasks/aws-scan-out

# 1020 S3 · 1030 IAM Deep · 1040 CloudTrail Operational Integrity (NEW 0.3.7) ·
# 1050 API Gateway Assurance (NEW 0.3.9) · 1060 DynamoDB Audit Integrity (NEW 0.3.9, PI1.5 matrix shift).
# Plugin IDs moved to disjoint 1000+ namespace in 0.3.9 — closed a silent CE plugin-040 collision.
# Optional escalation: AWS_S3_AUDIT_CONFIDENTIAL_BUCKETS=payroll,hr,backups (LOW → MEDIUM)
Azure — RBAC + NSG + Storage SOC 2 audit (plugin 022, service-principal auth)
CLOUD_PROVIDER=azure \
  AZURE_TENANT_ID=<your-tenant-id> \
  AZURE_CLIENT_ID=<sp-app-id> \
  AZURE_CLIENT_SECRET=<sp-secret> \
  AZURE_SUBSCRIPTION_ID=<subscription-id> \
  nsauditor-ai scan --host azure --plugins 022 \
    --compliance soc2 --out tasks/azure-scan-out

# Baseline (test subscription): findingCount=2, byStatus pass=6 fail=2
# Maps to: CC6.1 (RBAC Owner / Contributor / User Access Administrator at sub-scope),
#         CC6.6 (NSG inbound from * / 0.0.0.0/0 / Internet),
#         C1.1  (Storage defaultAction=Allow, allowBlobPublicAccess=true)
GCP — firewall + IAM enumeration (canonical-shape ready; SOC 2 mapping rules pending v0.4.0)
CLOUD_PROVIDER=gcp GCP_PROJECT_ID=my-project \
  nsauditor-ai scan --host gcp --plugins 021 --out tasks/gcp-scan-out
SOC 2 SHIPPING
AICPA TSC — 8 controls covered (multi-cloud)
NIST CSF
Cybersecurity Framework · planned
CIS
CIS Controls v8 · planned
HIPAA
Security Rule · planned
GDPR
Art. 32 Security · planned
PCI DSS
Payment Card Industry · planned
  • CVE matching (offline NVD)
  • Parallel analysis agents
  • Verified vulnerabilities
  • Risk scoring + prioritization
  • Intelligence-enriched AI prompts
  • Full MITRE ATT&CK mapping
  • Executive reports + PDF export
  • Branded reports (custom logo)
  • Advanced CTEM (unlimited history)
  • Enhanced redaction profiles
  • Pro MCP tools
  • 31 scanner plugins
Pro tools (included)
get_vulnerabilities Fetch findings from latest scan
risk_summary Prioritized risk overview
scan_compare CVE-level delta between scans
save_finding Persist validated findings
Enterprise tools
start_assessment Kick off a full enterprise scan
prioritize_risks Weighted risk ranking
compliance_check Framework gap analysis
export_report Generate branded PDF report
Enterprise
Dedicated Slack / email alias
Per SLA document
Enterprise Scale
Dedicated support engineer
4-hour critical · 24-hour standard

Zero Data Exfiltration — By Architecture, Not Policy

NSAuditor AI Enterprise runs entirely inside your infrastructure. Scan data, findings, reports, and credentials never touch Nsasoft servers. License validation is offline (JWT + embedded public key). We are not a data processor under any regulation.

No DPA required
No BAA required
No SOC 2 for scanning
Offline JWT license

Ready to get started?

Pick the Enterprise tier that fits your team — Base, Growth, or Scale. All tiers include the full Enterprise feature set, with onboarding call included.

Or start with the free Community Edition today · Custom requirements? enterprise@nsasoft.us