Sovereign Licence FAQ
Answers apply to the current fee schedule CLS-2026. For classified enquiries contact sales@cypsec.de
What happens if I exceed my seat count?
+
Over-run triggers an immediate true-up invoice at the band's per-seat rate, plus interest at ECB Main Refinancing Rate + 800 bps. Access is suspended until payment is received.
Are Special Modules refundable?
+
Special Modules are non-refundable once activated. They remain active for the full licence year and are renewed automatically unless cancelled 90 days before expiry.
What payment terms apply?
+
Annual entitlement is payable in advance within 10 calendar days of invoice. Late payment accrues interest at ECB Main Refinancing Rate + 800 bps. Access is suspended until payment is received.
What Managed Security Services are available?
+
CypSec operates sovereign Security Operations Centers (SOC) with tiered response capabilities. Services include 24/7 threat monitoring, vulnerability management, attack surface reduction, and integrated risk management. All operations maintain data residency within your jurisdiction with full audit transparency.
How does the Managed SOC integrate with existing infrastructure?
+
Deployment uses air-gapped collectors and encrypted telemetry channels that feed into your dedicated SOC instance. Integration with SIEM, EDR, and network appliances is handled under strict change-control protocols. No data leaves your sovereignty perimeter without explicit cryptographic validation.
What are the SLA commitments for incident response?
+
Band A clients receive 15-minute critical alert acknowledgment with dedicated incident assignment. Band B and C operate under tiered escalation with 1-hour and 4-hour response windows respectively. All SLAs are backed by contractual penalties.
What partner services complement the core licence?
+
CypSec maintains certified partner integrations for identity verification, background screening, penetration testing, red-team exercises, and threat modeling. These services are delivered under unified contractual frameworks with consolidated billing and coordinated security governance.
How are partner red-team exercises conducted?
+
Red-team engagements follow rules of engagement with pre-defined scope, duration, and authorization boundaries. All operators undergo background screening. Findings are delivered through customer-defined channels with remediation prioritized by criticality rating.
Is partner data shared across the ecosystem?
+
No. Partner services operate under strict data compartmentalization. Identity verification data, background check results, and penetration test findings remain siloed within each partner's security boundary. CypSec orchestrates workflows without aggregating sensitive intelligence, preserving your operational confidentiality.