Trust
Your data never leaves your cloud — sovereignty by design
Security Architecture
VPC deployment, credential encryption, no data export, query logging, role-based access.
VPC Deployment
Runs in customer infrastructure on AWS or GCP. Database credentials remain within your cloud.
Credential Handling
AES-256 encryption at rest, TLS 1.3 in transit. Credentials loaded into memory only when needed.
Query Logging
Full audit trail of all executed queries. See who accessed what, when, and why.
Shared Responsibility
Security partnership: you secure your VPC, network, and credentials. We secure application code, updates, and control plane.
Traces and Observability
Full visibility into every inference. Audit trails, debugging, and review of all reasoning.
Compliance Roadmap
SOC 2 Type II certification in progress. HIPAA BAA and ISO 27001 under consideration based on customer needs.