Not a "we're better than them" list. These are six design choices we made on day one that
turn compliance from a signed-off PDF into something an engineer can actually point at.
01 One key per person — destroy it to revoke.
Every subject gets their own encryption key. When consent ends, we destroy the key. The encrypted file stays on disk (so FIC Act s 23 retention is intact) but nobody can read it again — not us, not an insider, not a court order. This is how POPIA s 24 deletion and FICA retention live under the same roof.
02 An audit log that cannot be edited, even by us.
Every write and grant writes a row — and the database itself is configured so that row cannot be changed or deleted. Each row cryptographically references the one before it, so tampering would show up immediately. Most "audit logs" are just a view over editable rows; this one is not.
03 South African sovereignty, end to end.
Every storage layer — database, cache, object store, key manager — runs in AWS Cape Town (af-south-1). Search runs on a locally hosted embedder. OTP delivery goes through a South-African-hosted SMS provider. In the default install, zero personal information leaves the jurisdiction; optional LLM-assisted classification is an explicit opt-in that updates the s 72 disclosure the moment you flip it on.
04 Data never leaves without a signed ticket.
Every outbound document is a signed, audited checkout — with the recipient, the purpose and the lawful basis captured. Your rental agents, conveyancers and bank counterparties all talk to one vault under one consent graph, through the same public API.
05 A graph of entities, not a pile of folders.
Vault33 models people, companies, trusts, close corporations, sole props and assets as typed entities joined by named relationships. So "who ultimately owns >25% of company X via which trust on date Y" is a query — not a two-week consulting engagement.
06 Built on AWS KMS from day one.
Production wraps every subject key with AWS KMS in af-south-1 — so key rotation, revocation and deletion are standard cloud operations, not one-off scripts. The envelope design means we never have to re-encrypt documents to change providers or compliance regimes.