Menu

Security, Compliance, and Governance

Security, Compliance, and Governance

Built for regulated environments

Built for regulated environments

All inference runs on-prem

All inference runs

on-prem

The Agentic Works Platform is designed from the ground up to meet enterprise security and compliance requirements. Every component enforces data sovereignty and zero-trust principles.

The Agentic Works Platform is designed from the ground up to meet enterprise security and compliance requirements. Every component enforces data sovereignty and zero-trust principles.

Zero-Trust Mesh Networking

All communication uses encrypted tunnels with mutual TLS authentication. No implicit trust between components.

Tenant Isolation

Complete separation between tenants at network, compute, and data layers. No shared resources expose cross-tenant data.

End-to-End Encryption

AES-256 encryption for data at rest. TLS 1.3 for data in transit. Keys managed by your infrastructure or HSM.

Industry-Specific Compliance

Industry-Specific Compliance

Keycloak-based identity management integrates with your existing SSO providers (Okta, Azure AD, Google Workspace). Role-based access control enforces least-privilege principles across all platform components.

•

SAML 2.0 and OAuth 2.0 / OpenID Connect support

•

Multi-factor authentication enforcement

•

Fine-grained permissions for workflows and data

Zero Trust Architecture

Zero Trust Architecture

Network Segmentation & Mesh

Identity & Access Management

Encryption & Certificates

Network Segmentation & Mesh

Identity & Access Management

Encryption & Certificates

Complete Data Control

Complete Data Control

Data Sovereignty

All sensitive data processing occurs within your infrastructure boundaries. The cloud control plane never accesses, stores, or processes your data.

•

LLM inference runs exclusively on-premises

•

Document embeddings generated locally

•

Vector search never leaves your network

•

Logs and metrics stored in your environment

What the Cloud Sees

The cloud control plane handles orchestration metadata only and never your actual data, queries, or results.


The cloud control plane handles orchestration metadata only and never your actual data, queries, or results.

The cloud control plane handles orchestration metadata only and never your actual data, queries, or results.

•

Workflow state and execution status

•

Identity and authentication tokens

•

System health metrics (CPU, memory, uptime)

•

API gateway routing information

Data Retention and Deletion

Backup Controls

Encrypted backups with your key management. Air-gapped backup option for maximum security.

Right to Deletion

GDPR and CCPA compliant data deletion workflows. Remove all instances of specific data across the platform.

Retention Policies

Configure retention periods for logs, audit trails, and temporary data. Automated cleanup enforces your policies.

Compliance and Governance

Compliance and Governance

SOC 2 Type II

Comprehensive controls for security, availability, processing integrity, confidentiality, and privacy.

GDPR & Privacy

Built-in data protection and privacy controls to meet EU and regional regulations.

HIPAA

Protected health information handling with BAA coverage for healthcare deployments.

Industry-Specific Compliance

Government

FedRAMP Moderate/High pathways · NIST 800-53 controls · FIPS 140-2 cryptography

Financial Services

SEC and FINRA record keeping · PCI-DSS for payment data · FFIEC compliance for banking

Network Topology

Network Topology

Secure Communication Flow

Tenant Zone

Your Infrastructure

Private subnet · No inbound internet · Outbound HTTPS only

Private subnet

No inbound internet

Outbound HTTPS only

Private subnet

No inbound internet Outbound HTTPS only

Control Plane

Cloud Orchestration

API gateway · Identity service ·

Workflow engine

API gateway

Identity service

Workflow engine

AI Zone

On-Premises Execution

Isolated network · Local storage ·

GPU nodes

Isolated network

Local storage

GPU nodes

Network Requirements

•

Outbound HTTPS to control plane (443)

•

Optional: VPN for air-gapped deployments

•

Internal network for component communication

•

Firewall rules for micro-segmentation

Security Zones

•

DMZ for web portal and user access

•

Application tier for workflow runners

•

Data tier for AI models and vector DB

•

Management tier for monitoring and ops

Audit, Logs, and Observability

Audit, Logs, and Observability

Comprehensive Audit Trails

Every action in the platform is logged with who, what, when, and from where. Immutable audit logs support compliance requirements.

•

User authentication and authorization events

•

Data access and modification logs

•

Workflow execution and state changes

•

System configuration changes

•

AI inference requests and responses (metadata)

Observability Stack

Built-in monitoring with Prometheus, Grafana, and OpenTelemetry. All observability data stays in your environment.

•

System metrics (CPU, memory, GPU utilization)

•

Application performance monitoring

•

Model inference latency and throughput

•

Workflow execution analytics

•

Custom dashboards and alerting

Log Retention and Management

SIEM Integration

Export logs to your existing SIEM (Splunk, QRadar, Sentinel). Standard formats (CEF, LEEF) for security event correlation and threat detection.

Log Aggregation

Centralized logging with ELK stack or Loki. Structured logs with correlation IDs for distributed tracing. Search and analysis tools included.

Retention Policies

Configure retention periods by log type. Audit logs: 7 years default. Application logs: 90 days default. Customizable per compliance requirements.

Ready to deploy secure AI in your environment?

Ready to deploy secure AI in your environment?

Create a free website with Framer, the website builder loved by startups, designers and agencies.