Security

Private, governed intelligence

Tenant-bounded, evidence-backed intelligence with controls built for security review.

Security principles

A three-layer operating model.

Top layer

No model training on customer data

Customer content is processed for requests, not model training.

Middle layer

Tenant isolation

Storage, search, and application access boundaries are enforced per organisation.

Base layer

Data ownership

Your organisation controls its data and how it is used.

Data handling

Source to output in four steps.

Source

Files enter from approved sources.

Indexed

Content is chunked and indexed in-boundary.

Retrieved

Relevant context is selected per request.

Output

A cited output is returned.

At a glance
Stored vs request-scoped
Stored

Source files, derived indexes, and access configuration.

Request-scoped

Prompts, retrieval context, and model responses.

Platform controls

Controls grouped by domain.

Identity and access

Authentication

SSO-compatible identity and role-based access.

Embedded access

Short-lived signed tokens scope each embedded experience.

Data protection

Encryption

TLS in transit and encryption at rest.

Tenant separation

Access rules follow tenant boundaries across storage and search.

Observability

Audit logging

Captured events and storage depend on deployment and policy.

Deployment options

A direct comparison of operating models.

Managed

Fastest to deploy

Aveya-managed deployment

  • Aveya-operated environment
  • Tenant isolation and regional hosting controls
  • No customer infrastructure ownership required

Private

Maximum control

Deployment in your Azure tenant

  • Runs in your own Azure subscription
  • Control over networking, policy, and security tooling
  • Suitable for high-control and regulated environments

Compliance approach

Built on Azure services with established security and compliance programs.

  • Azure provides certified infrastructure controls
  • We support enterprise security questionnaires and reviews

Additional review documentation is available on request, including architecture, data flow, control mapping, and deployment detail.

Security packReview-ready
Security review pack
ArchitectureOverview included
Data flowBoundary mapping
ControlsReview detail
Available on request

Next step

Plan your security review

We'll align on your scope, deployment model, and what your team needs for a practical security review.

  • Tenant-bounded operation
  • Evidence-backed outputs