Solutions Research Lab Security Case Studies Request Audit

Security & Architecture

Your Data Never
Leaves Your
Perimeter.

We remove the "Is my data safe?" question from your sales cycle entirely. Every system we build defaults to maximum isolation — on-premise, encrypted at every layer, and auditable at every step.

HIPAA Compliant GDPR Ready SOC 2 Type II ISO 27001 Air-Gap Capable
Request Security Briefing
🔒
Encrypted Transit On-Premise Inference Zero Data Egress Air-Gap Ready
System Status All Systems Operational
Uptime 99.97%
Data Egress 0.00 bytes
Threat Events 0 Active
Last Pen Test Aug 2025 — Passed
Encryption AES-256 Active

Deployment Architecture

Three Modes of
Sovereign Deployment

Every engagement starts with a security posture conversation. We match your infrastructure reality with the deployment model that best protects your data — without sacrificing performance.

🏢

Full On-Premise

Model weights, inference engine, API layer, and monitoring stack all run within your data center. Zero cloud dependency. Your hardware, your rules, your auditors.

Runs on your bare-metal or VMware
No internet required post-deployment
Full model weight ownership
Auditor-accessible logging
Updates via cryptographically signed packages
🔌

Air-Gapped Deployment

For defence, intelligence, and highly regulated verticals. The inference system has zero network connectivity. Updates delivered via offline signed packages on hardened media.

Physically isolated — no NIC required
Signed offline update protocol
Hardware security module integration
Classified environment compatible
Model weight encryption at rest

Data Protection

Encryption at
Every Layer

We don't encrypt at the perimeter and trust everything inside. We apply independent encryption at every layer of the stack — from raw storage to model weights to the API response.

// Encryption Stack — Layer by Layer

L7 API Response TLS 1.3 · HSTS
L6 Application Layer JWT · mTLS
L5 Inference Engine Enclave · SGX
L4 Model Weights AES-256-GCM
L3 Training Data Store AES-256 · KMIP
L2 Block Storage LUKS · BitLocker
L1 HSM / Key Vault FIPS 140-2 Level 3
✓ Keys never co-located with data · Customer-managed KMS available
🔑

Customer-Managed Keys

You hold the root key. We never have access to your encryption keys — architecture enforced, not policy enforced. If you revoke the key, the model is unreadable, instantly.

Bring Your Own Key (BYOK)
🧱

Trusted Execution Environments

Inference runs inside Intel SGX enclaves where supported — meaning even a compromised host OS cannot read the model weights or the inference data passing through the system.

Intel SGX · AMD SEV
🌐

Zero-Trust Network Architecture

Every service-to-service call is authenticated via mutual TLS with short-lived certificates. No implicit trust within the perimeter. Every request is verified, logged, and rate-limited independently.

mTLS · SPIFFE / SPIRE
📝

Immutable Audit Logs

Every inference request, model access event, key rotation, and admin action is logged to a write-once, cryptographically chained audit trail. Tamper-evident and regulator-ready out of the box.

WORM Logs · SHA-256 Chain

Maximum Isolation

Air-Gap Deployment
Architecture

For environments where any network connectivity is unacceptable — classified government systems, critical infrastructure, and tier-1 financial networks — we operate with complete physical isolation.

// Network Topology — Air-Gapped Mode

⚠ External / Internet Zone

🌐 Public Internet ☁️ Cloud APIs 📡 External Services
🔒 PHYSICAL AIR GAP — NO NETWORK CROSSING

📦 Update Transfer Protocol (Offline)

💾 Signed Package 🔐 HSM Verify ✅ Hash Check
🛡️ SECURE ENCLAVE BOUNDARY

✓ Secure AI Zone — Fully Isolated

🧠 SLM Inference 🗄️ Data Store 🔑 HSM 📊 Monitoring
📦

Offline Update Protocol

Model upgrades are delivered as cryptographically signed package bundles on hardened removable media. The receiving system verifies vendor signature, package integrity hash, and version sequence before applying — and rejects anything that fails.

VERIFY: sha256sum + vendor.sig → APPLY → LOG → SEAL
🔐

Hardware Security Module Integration

All cryptographic operations — key generation, signing, encryption/decryption — run inside a FIPS 140-2 Level 3 certified HSM. Keys are non-exportable; the HSM physically destroys them on tamper detection.

HSM: FIPS 140-2 L3 · Tamper-Evident · Non-Exportable Keys
👁️

Internal-Only Observability

Monitoring, alerting, and dashboards run entirely within the air-gapped perimeter. Logs never leave. Metrics are consumed by an internal Grafana instance with no external data plane.

Prometheus + Grafana · Internal Only · Zero Telemetry Out
📋

Classified Environment Compatibility

Our air-gap deployment runbook has been tested against IL4, IL5, and TEMPEST-adjacent requirements. We provide architecture documentation suitable for submission to security review boards.

IL4 / IL5 Compatible · TEMPEST-Adjacent · SecRef Available

Regulatory Compliance

Built for Regulated
Industries

Compliance is not a checkbox we tick at the end. It is an architectural constraint baked into every design decision from day one. Here's what we cover — and how.

HIPAA

Health Insurance Portability and Accountability Act

All PHI processed by our healthcare SLMs stays within your HIPAA-compliant boundary. Business Associate Agreements (BAAs) included with every healthcare engagement.

PHI never leaves your perimeter
BAA included as standard
Audit log meets § 164.312(b)
Minimum necessary data principle

GDPR

General Data Protection Regulation (EU/UK)

Data residency, right to erasure, and processing lawfulness are all architecture-level guarantees. We support SCCs and can deploy within specific EU jurisdictions on request.

Data residency enforcement
Right to erasure (model unlearning)
DPA & SCCs provided
Lawful basis documentation

SOC 2

System and Organization Controls — Type II

Our own platform infrastructure holds SOC 2 Type II certification across all five Trust Service Criteria. Client-facing deployments include continuous monitoring controls that satisfy SOC 2 requirements.

All 5 TSC covered
Annual third-party audit
Report available under NDA
Continuous control monitoring

ISO 27001

International Information Security Standard

Our ISMS is certified to ISO/IEC 27001:2022. We extend our ISMS controls to client deployments, providing a documented security management framework that satisfies enterprise procurement requirements globally.

ISO 27001:2022 certified
Risk register maintained
Annual surveillance audit
Applicable to all engagements

PCI DSS

Payment Card Industry Data Security Standard

Fintech deployments that touch cardholder data are scoped and segmented per PCI DSS v4.0. We architect the model inference layer to operate outside cardholder data environments where possible.

CDE scoping & segmentation
Tokenization-first design
QSA-friendly documentation
PCI DSS v4.0 aligned

FedRAMP

Federal Risk and Authorization Management Program

For US federal agency deployments, we architect against FedRAMP Moderate and High baselines. Air-gapped deployments are compatible with IL4/IL5 requirements for classified workloads.

FedRAMP Moderate aligned
IL4 / IL5 architecture support
NIST 800-53 control mapping
ATO documentation available
📋

Compliance Documentation Package

Every enterprise engagement includes a Compliance Documentation Package: SOC 2 report (under NDA), ISO 27001 certificate, data processing agreement templates, BAA (for healthcare), architecture diagrams cleared for security review boards, and a completed vendor security questionnaire (VSQ) covering the most common enterprise procurement requirements.

Threat Modelling

What We Protect
Against

We run formal threat modelling (STRIDE) against every deployment. Here is the threat landscape we architect against — and how each one is mitigated at the system level.

Threat Vector Mitigation Status
Model Weight Exfiltration AES-256 at rest + SGX enclave ● Mitigated
Training Data Leakage DP training + data residency ● Mitigated
Prompt Injection Attack Input sanitisation + output guard ● Mitigated
Model Inversion Attack Differential privacy + rate limits ● Mitigated
Supply Chain Compromise Signed packages + SBOM ● Mitigated
Insider Threat Zero-trust + immutable audit log ● Mitigated
API Credential Theft Short-lived tokens + mTLS ● Mitigated
Adversarial Input Adversarial training + detection ◐ Architecturally Contained
1

Assume Breach

We design assuming any single component can be compromised. Lateral movement is prevented through strict network segmentation, least-privilege identities, and encrypted channels between every service.

2

Defence in Depth

Seven independent encryption layers means an attacker who bypasses one faces six more. No single vulnerability results in data exposure. Each layer has independent key management.

3

Least Privilege by Default

Every service account, API token, and human operator starts with zero permissions. Access is granted specifically, scoped minimally, and expires automatically. No standing elevated access.

4

Cryptographic Verification Everywhere

Model packages, configuration files, and update bundles are all signed and verified before execution. No unsigned artifact is loaded into memory. Trust is mathematical, not organisational.

Security Concerns?
Let's Architect Together.

Request a Security Architecture Briefing — a 60-minute session with our security team where we walk through your specific threat model, compliance requirements, and how our architecture addresses each one.

Request Security Briefing Read Security Research