Your Files Don't Move. Your Permissions Don't Change. Your Compliance Posture Stays Intact.

MyWorkDrive is a gateway, not a repository. It provides encrypted access to files where they already live, without syncing, copying, or storing them on a third-party cloud. Your existing permissions stay authoritative. Your compliance framework stays intact. No new attack surface. No new data processor.

Compliance Hero Image

Most File Access Tools Store Your Data. That's A Compliance Problem.

With sync-and-share platforms, files get copied to a vendor cloud. That's another attack surface, another data processor, another place you have to prove controls. MyWorkDrive's gateway model is different: files stay on your storage, under your control, governed by your permissions.

Data sovereignty by design

File content never resides on MyWorkDrive servers. No third-party cloud stores your data. Your storage remains the single source of truth, in the jurisdiction and environment you choose.

Existing permissions stay authoritative

Your NTFS permissions, SharePoint ACLs, and Azure RBAC remain the source of access control. MyWorkDrive can restrict access further by policy, but it can never elevate permissions beyond what your storage and identity already grant.

One audit trail for everything

Whether files live on SMB shares, Azure Files, or SharePoint, every access event flows through the same gateway and into the same audit log. No blind spots. No reconciling logs from five different systems.

How MyWorkDrive Maps To The Frameworks You're Measured Against

Compliance isn't a checkbox. It's proving to an auditor that specific controls are in place and functioning. Here's how MyWorkDrive addresses requirements across major frameworks.

HIPAA Compliant

Healthcare Data Protection

Protected health information stays in your storage. MyWorkDrive provides the technical safeguards required by the HIPAA Security Rule, and a Business Associate Agreement is available on request.

Technical safeguards addressed:

Access Control (§164.312(a)): AD/Entra ID integration with MFA enforcement at identity provider
Audit Controls (§164.312(b)): Complete file access logging with SIEM export via Syslog
Integrity (§164.312(c)): No file modification in transit, least-privilege enforcement
Transmission Security (§164.312(e)): TLS 1.2+ encryption on all connections
CMMC Certification

Defense Contractor Requirements

MyWorkDrive aligns with CMMC Level 2 control families for organizations handling Controlled Unclassified Information (CUI). Self-hosted architecture keeps CUI in approved environments.

Control families addressed:

Access Control (AC): Role-based access through AD groups, device approval for endpoint control
Audit & Accountability (AU): Detailed audit trails with user, file, action, timestamp, and IP
Identification & Auth (IA): IdP-owned MFA, SAML/OIDC SSO, no local password storage
System & Comms Protection (SC): TLS 1.2+, FIPS-validated cryptography, encrypted sessions
GDPR Compliant

EU Data Protection Regulation

MyWorkDrive's architecture aligns with GDPR's core principles by design. File content does not reside on application servers, supporting data minimization. Files remain in designated locations, supporting data residency requirements.

Article 32 alignment:

Encryption in transit: TLS 1.2+ on all client and API connections
Data minimization: No file content stored on MyWorkDrive servers
Audit trail: Complete logging of all access and sharing activity
Data residency: Files remain in the locations and jurisdictions you choose
SOC 2 Type II Aligned

Aligned With Trust Service Criteria

MyWorkDrive's security controls align with SOC 2 Type II trust service criteria for availability, confidentiality, and processing integrity. The gateway architecture supports these principles by design.

Trust service criteria:

Security: TLS encryption, identity provider integration, least-privilege access model
Availability: Multi-node deployment support with load balancing and session persistence
Confidentiality: DLP controls, device approval, encrypted sessions, no data at rest on servers
Processing Integrity: File operations processed in memory only, write-back on save
FINRA Aligned

Financial Services Compliance

Financial services organizations use MyWorkDrive to enforce data handling policies for sensitive financial records while maintaining the audit trail that regulators expect.

Capabilities for financial compliance:

Immutable audit trail: All file access logged with user, action, timestamp, device, and IP
DLP enforcement: View-only mode with watermark for sensitive financial documents
Controlled sharing: Password-protected links with mandatory expiration (e.g. 24-hour)
Data sovereignty: Files remain on firm-controlled infrastructure at all times
FIPS 140-2 Aligned

Federal Standards

MyWorkDrive holds FIPS 186-4 RSA algorithm validation (NIST Certificate #3018). The self-hosted architecture supports FedRAMP requirements by keeping government data within approved infrastructure.

Federal Alignment:

FIPS cryptography Validated RSA algorithm with Windows FIPS mode support
On-premises deployment: 100% private cloud option with no external dependencies
Office editing: Local Office Online Server option for air-gapped environments
FedRAMP Office 365: Hybrid option using Microsoft's FedRAMP-compliant editors

A Complete Audit Trail Comes Built In

Every file access event is logged with the detail auditors and regulators require. Export to your SIEM, search by keyword, or filter by user, date, or action.

Structured event logging

Authentication outcomes, file operations (view, edit, download, delete), public link lifecycle, admin changes, and device approvals. Each event includes user, source IP, device identifier, share, path, operation, result, and bytes transferred.

SIEM integration via Syslog

Export structured logs to Splunk, QRadar, Microsoft Sentinel, or any Syslog-compatible platform. Choose verbosity from high-level errors to detailed debug output.

Alerting and thresholds

Configure alerts for mass downloads, sudden public link creation on sensitive shares, repeated authentication failures, unusual device requests, and unexpected policy changes.

Sample Audit Log Output
Unified across all storage types

Whether files are on SMB shares, Azure Files, or SharePoint/OneDrive, all access flows through the same gateway and into the same log. No blind spots from VPN tunnels or multiple access methods.

Controls That Auditors Can Verify And Users Can Live With

DLP isn't just about blocking access. It's about enforcing the right level of access for the right user on the right file, with proof that it happened.

View-Only Mode

Users view files in a secure browser viewer. Downloads, clipboard access, and printing are blocked. Dynamic watermarks stamp each view with the user's identity and timestamp.

View-Only Mode
Granular Enforcement

Granular Enforcement

Configure DLP per share, per group, or per user. Marketing gets download with watermark. Contractors get view-only. HR shares block all downloads. Rules apply across web, mapped drive, and mobile.

Device Approval

Control which devices can connect via mapped drive and mobile clients. Start in monitor mode to build an allowlist, then enforce. Unapproved devices are blocked from access.

Device Approval

Built For Zero Trust, Not Bolted On

MyWorkDrive's security model follows zero trust principles: identity-based access, least privilege, continuous verification, and encrypted communications. No VPN. No lateral movement exposure.

01

Port 443 only

All client connections use HTTPS. SMB (445), NetBIOS (139), and DNS (53) are never exposed to external clients. Eliminates the lateral movement risk of VPN-based file access.

02

Cannot elevate permissions

MyWorkDrive honors your existing NTFS, SharePoint, and Azure RBAC permissions. It can restrict further by policy, but can never grant access beyond what storage and identity already allow.

03

Zero data at rest on servers

File contents are processed in memory only and never written to disk on MyWorkDrive application servers. Browser editing uses temporary staging in your Microsoft 365 tenant with automatic cleanup.

04

TLS 1.2+ everywhere

All client connections, API communications, and internal paths are encrypted with TLS 1.2 or higher. TLS 1.3 preferred where supported. FIPS-validated cryptography available.

Files stay put, Logs go to your SIEM.

See The Audit Trail On Your Own Files

Start a free 30-day trial. Connect your storage, enable DLP on a test share, and generate your first audit log export, all in a single afternoon.

Deploy in hours. Not months. $5/user/month HIPAA, CMMC, GDPR ready 700,000+ users