Security you can audit

Your data never leaves the perimeter. The agent reads on demand, analyzes and discards. Everything it did is recorded in an immutable audit trail visible to you.

Minimum Access with Full Control

On-demand reading, no persistence

The agent reads data only during active investigation. After analysis, data is discarded. We don't store raw customer data.

Data read on demand, analyzed in-memory, discarded after investigation completion.

Least privilege access

Each integration uses read-only credentials with minimum scope via OAuth. The agent never has write access unless explicitly authorized.

OAuth scopes limited to read-only; write access requires explicit human approval.

No writing by default

The agent is read-only. Remediation actions require explicit user approval (human-in-the-loop) before any destructive action.

All write operations gated behind human-in-the-loop approval flow.

Isolation and Transparency

Tenant isolation

Each customer has individual KMS encryption via AWS. Data is never mixed between customers. LLM calls contain data from exactly one tenant.

Per-tenant KMS keys, isolated ECS tasks, single-tenant LLM contexts.

No cross-training

Customer data is never used to train models for other customers. Fine-tuning is exclusive per account when applicable.

Zero cross-customer data sharing; per-account fine-tuning isolation.

Immutable audit trail

Each investigation generates detailed log in S3 with Object Lock (WORM). The log is visible to the customer and cannot be altered.

S3 Object Lock (WORM), includes: sources accessed, data read, tokens processed, result.

Compliance & Certifications

CertificationStatusDetails
LGPDCompliant since launchKMS per-tenant + TTL + right-to-delete. Data subject requests fulfilled in 15 days. Breach notification in 72h.
GDPRCompliant since launchSame mechanisms cover GDPR. Standard Contractual Clauses for cross-border transfers.
SOC 2 Type IRoadmap: month 6-9Automated compliance platform. Timeline aligned with SOC 2 readiness milestones.
SOC 2 Type IIRoadmap: month 12-18Full audit cycle with independent assessor. Builds on Type I controls.
ISO 27001 / HIPAARoadmap: Year 2+As enterprise demand requires.

Security Architecture

Client (HTTPS) -> WAF -> ALB -> ECS Tasks (private subnets)

ECS Tasks -> NAT Gateway -> External APIs (Slack, GitHub, etc.)

Credentials in AWS Secrets Manager with automatic rotation

RDS/DynamoDB in private subnet with no internet exposure

All logs centralized in CloudWatch + S3 Object Lock

Data at rest: AES-256 via KMS per-tenant. Data in transit: TLS 1.3

Data Isolation (Multi-tenancy)

LayerIsolation Mechanism
ApplicationTenant ID required in every query, log and record. LLM calls containing data from exactly one tenant.
DatabasePostgreSQL with Row Level Security (RLS) by tenant_id.
Vector DBPartitioned vector storage with hard isolation per tenant. Designed to scale to millions of tenants.
InfrastructureEach investigation runs in ephemeral ECS Task with restricted IAM Role. Container destroyed upon completion.
PII GatewayMicrosoft Presidio detects and anonymizes emails, phones, SSNs, cards. Reversible anonymization.
EncryptionData at rest: AES-256 via KMS per-tenant. Data in transit: TLS 1.3.

AWS Bedrock as LLM Provider

AWS does not use customer data to train models

Model providers have zero access to prompts/completions

ISO/IEC 42001 certification (first major cloud provider)

PrivateLink support for VPC-private connectivity

Guardrails for PII detection/redaction

Enterprise Security. Startup Pricing.