Security, Compliance, and Governance
Built for regulated environments
All inference runs on-prem
The Agentic Works Platform is designed from the ground up to meet enterprise security and compliance requirements. Every component enforces data sovereignty and zero-trust principles.
Zero-Trust Mesh Networking
All communication uses encrypted tunnels with mutual TLS authentication. No implicit trust between components.
Tenant Isolation
Complete separation between tenants at network, compute, and data layers. No shared resources expose cross-tenant data.
End-to-End Encryption
AES-256 encryption for data at rest. TLS 1.3 for data in transit. Keys managed by your infrastructure or HSM.
Industry-Specific Compliance
Keycloak-based identity management integrates with your existing SSO providers (Okta, Azure AD, Google Workspace). Role-based access control enforces least-privilege principles across all platform components.
•
SAML 2.0 and OAuth 2.0 / OpenID Connect support
•
Multi-factor authentication enforcement
•
Fine-grained permissions for workflows and data
Zero Trust Architecture
Network Segmentation & Mesh
Identity & Access Management
Encryption & Certificates
Complete Data Control
Data Sovereignty
All sensitive data processing occurs within your infrastructure boundaries. The cloud control plane never accesses, stores, or processes your data.
•
LLM inference runs exclusively on-premises
•
Document embeddings generated locally
•
Vector search never leaves your network
•
Logs and metrics stored in your environment
What the Cloud Sees
•
Workflow state and execution status
•
Identity and authentication tokens
•
System health metrics (CPU, memory, uptime)
•
API gateway routing information
Data Retention and Deletion
Backup Controls
Encrypted backups with your key management. Air-gapped backup option for maximum security.
Right to Deletion
GDPR and CCPA compliant data deletion workflows. Remove all instances of specific data across the platform.
Retention Policies
Configure retention periods for logs, audit trails, and temporary data. Automated cleanup enforces your policies.
Compliance and Governance
SOC 2 Type II
Comprehensive controls for security, availability, processing integrity, confidentiality, and privacy.
GDPR & Privacy
Built-in data protection and privacy controls to meet EU and regional regulations.
HIPAA
Protected health information handling with BAA coverage for healthcare deployments.
Industry-Specific Compliance
Government
FedRAMP Moderate/High pathways · NIST 800-53 controls · FIPS 140-2 cryptography
Financial Services
SEC and FINRA record keeping · PCI-DSS for payment data · FFIEC compliance for banking
Network Topology
Secure Communication Flow
Tenant Zone
Your Infrastructure
Control Plane
Cloud Orchestration
AI Zone
On-Premises Execution
Network Requirements
•
Outbound HTTPS to control plane (443)
•
Optional: VPN for air-gapped deployments
•
Internal network for component communication
•
Firewall rules for micro-segmentation
Security Zones
•
DMZ for web portal and user access
•
Application tier for workflow runners
•
Data tier for AI models and vector DB
•
Management tier for monitoring and ops
Audit, Logs, and Observability
Comprehensive Audit Trails
Every action in the platform is logged with who, what, when, and from where. Immutable audit logs support compliance requirements.
•
User authentication and authorization events
•
Data access and modification logs
•
Workflow execution and state changes
•
System configuration changes
•
AI inference requests and responses (metadata)
Observability Stack
Built-in monitoring with Prometheus, Grafana, and OpenTelemetry. All observability data stays in your environment.
•
System metrics (CPU, memory, GPU utilization)
•
Application performance monitoring
•
Model inference latency and throughput
•
Workflow execution analytics
•
Custom dashboards and alerting
Log Retention and Management
SIEM Integration
Export logs to your existing SIEM (Splunk, QRadar, Sentinel). Standard formats (CEF, LEEF) for security event correlation and threat detection.
Log Aggregation
Centralized logging with ELK stack or Loki. Structured logs with correlation IDs for distributed tracing. Search and analysis tools included.
Retention Policies
Configure retention periods by log type. Audit logs: 7 years default. Application logs: 90 days default. Customizable per compliance requirements.
Ready to deploy secure AI in your environment?