Menu

Security, Compliance, and Governance

Built for regulated environments

All inference runs on-prem

The Agentic Works Platform is designed from the ground up to meet enterprise security and compliance requirements. Every component enforces data sovereignty and zero-trust principles.

Zero-Trust Mesh Networking

All communication uses encrypted tunnels with mutual TLS authentication. No implicit trust between components.

Tenant Isolation

Complete separation between tenants at network, compute, and data layers. No shared resources expose cross-tenant data.

End-to-End Encryption

AES-256 encryption for data at rest. TLS 1.3 for data in transit. Keys managed by your infrastructure or HSM.

Industry-Specific Compliance

Keycloak-based identity management integrates with your existing SSO providers (Okta, Azure AD, Google Workspace). Role-based access control enforces least-privilege principles across all platform components.

SAML 2.0 and OAuth 2.0 / OpenID Connect support

Multi-factor authentication enforcement

Fine-grained permissions for workflows and data

Zero Trust Architecture

Network Segmentation & Mesh

Identity & Access Management

Encryption & Certificates

Complete Data Control

Data Sovereignty

All sensitive data processing occurs within your infrastructure boundaries. The cloud control plane never accesses, stores, or processes your data.

LLM inference runs exclusively on-premises

Document embeddings generated locally

Vector search never leaves your network

Logs and metrics stored in your environment

What the Cloud Sees

The cloud control plane handles orchestration metadata only and never your actual data, queries, or results.


The cloud control plane handles orchestration metadata only and never your actual data, queries, or results.

Workflow state and execution status

Identity and authentication tokens

System health metrics (CPU, memory, uptime)

API gateway routing information

Data Retention and Deletion

Backup Controls

Encrypted backups with your key management. Air-gapped backup option for maximum security.

Right to Deletion

GDPR and CCPA compliant data deletion workflows. Remove all instances of specific data across the platform.

Retention Policies

Configure retention periods for logs, audit trails, and temporary data. Automated cleanup enforces your policies.

Compliance and Governance

SOC 2 Type II

Comprehensive controls for security, availability, processing integrity, confidentiality, and privacy.

GDPR & Privacy

Built-in data protection and privacy controls to meet EU and regional regulations.

HIPAA

Protected health information handling with BAA coverage for healthcare deployments.

Industry-Specific Compliance

Government

FedRAMP Moderate/High pathways · NIST 800-53 controls · FIPS 140-2 cryptography

Financial Services

SEC and FINRA record keeping · PCI-DSS for payment data · FFIEC compliance for banking

Network Topology

Secure Communication Flow

Tenant Zone

Your Infrastructure

Private subnet · No inbound internet · Outbound HTTPS only

Private subnet

No inbound internet Outbound HTTPS only

Control Plane

Cloud Orchestration

API gateway · Identity service ·

Workflow engine

API gateway

Identity service

Workflow engine

AI Zone

On-Premises Execution

Isolated network · Local storage ·

GPU nodes

Isolated network

Local storage

GPU nodes

Network Requirements

Outbound HTTPS to control plane (443)

Optional: VPN for air-gapped deployments

Internal network for component communication

Firewall rules for micro-segmentation

Security Zones

DMZ for web portal and user access

Application tier for workflow runners

Data tier for AI models and vector DB

Management tier for monitoring and ops

Audit, Logs, and Observability

Comprehensive Audit Trails

Every action in the platform is logged with who, what, when, and from where. Immutable audit logs support compliance requirements.

User authentication and authorization events

Data access and modification logs

Workflow execution and state changes

System configuration changes

AI inference requests and responses (metadata)

Observability Stack

Built-in monitoring with Prometheus, Grafana, and OpenTelemetry. All observability data stays in your environment.

System metrics (CPU, memory, GPU utilization)

Application performance monitoring

Model inference latency and throughput

Workflow execution analytics

Custom dashboards and alerting

Log Retention and Management

SIEM Integration

Export logs to your existing SIEM (Splunk, QRadar, Sentinel). Standard formats (CEF, LEEF) for security event correlation and threat detection.

Log Aggregation

Centralized logging with ELK stack or Loki. Structured logs with correlation IDs for distributed tracing. Search and analysis tools included.

Retention Policies

Configure retention periods by log type. Audit logs: 7 years default. Application logs: 90 days default. Customizable per compliance requirements.

Ready to deploy secure AI in your environment?

Create a free website with Framer, the website builder loved by startups, designers and agencies.