Security & Compliance

Overview

This page provides detailed security information for your security team’s review. It covers:

  • Network architecture and traffic flow
  • Integration points with your existing infrastructure
  • Authentication and access control
  • Data retention and storage
  • Encryption at rest and in transit
  • Logging and audit capabilities

All self-hosted deployments—regardless of cloud provider—follow these security principles. Provider-specific implementation details are covered in the respective deployment guides.

Networking

All traffic flows through your private network. There is no public internet ingress by default—users access Confident AI through your existing VPN, network peering, or private connectivity setup. The only outbound traffic is to LLM providers for evaluations (if using external models) and optional notification services.

Network isolation

ComponentNetwork placementAccess
Load balancerPrivate subnet (or public with restrictions)Your corporate network only
Application servicesPrivate subnetNo direct internet access
DatabasePrivate/isolated subnetApplication services only
Object storagePrivate endpointApplication services only

Internet-facing option: For organizations that prefer public access (with authentication), the load balancer can be configured as internet-facing. This increases attack surface but simplifies access for distributed teams without VPN.

Integration points

The deployment supports several integration points with your existing infrastructure. All inbound connections come through your private network; outbound connections go through NAT/gateway with optional private endpoint support.

IntegrationDirectionProtocolPurpose
Corporate SSOInboundSAML/OIDCUser authentication via your identity provider
LLM providersOutboundHTTPSOpenAI, Azure OpenAI, Anthropic, or self-hosted models for evaluations
Private connectivityBidirectionalPrivateConnect to your existing cloud infrastructure
Slack / EmailOutboundHTTPS/SMTPAlert notifications and evaluation reports
OTEL collectorsInboundgRPC/HTTPReceive traces from your LLM applications
CI/CD pipelinesInboundHTTPSTrigger evaluations from GitHub Actions, Jenkins, etc.

Private endpoints: All major cloud providers offer private endpoint services (AWS PrivateLink, Azure Private Link, GCP Private Service Connect) that allow integration traffic to stay within your cloud network, eliminating public internet exposure.

Outbound access to LLM providers is required for evaluations. If your organization restricts outbound traffic, ensure the following are allowlisted:

  • api.openai.com (OpenAI)
  • *.openai.azure.com (Azure OpenAI)
  • api.anthropic.com (Anthropic)

Alternatively, use self-hosted or on-premise LLM models that don’t require external network access.

Authentication

Confident AI does not maintain its own user database for self-hosted deployments. All user authentication is handled through your corporate identity provider via SAML or OIDC. This means user credentials never touch Confident AI systems—authentication tokens are validated against your IdP directly.

MethodDescription
SSO (SAML/OIDC)Primary authentication method via your identity provider (Okta, Azure AD, Google Workspace, etc.)
Google OAuthOptional OAuth authentication for organizations using Google Workspace
API keysScoped per project for programmatic access (SDK, CI/CD, integrations)
Service accountsCloud-native IAM for service-to-service authentication (IRSA, Workload Identity, etc.)

Local accounts are not supported. All human users must authenticate via SSO. This ensures: - Centralized access control through your IdP - Automatic deprovisioning when employees leave - Consistent MFA enforcement - Audit trail in your identity system

API key security

API keys are used for programmatic access and have the following security properties:

  • Project-scoped: Each API key is tied to a specific project and cannot access other projects
  • Revocable: Keys can be revoked instantly from the dashboard or API
  • Audited: All API key usage is logged with request details
  • No user impersonation: API keys cannot perform user-level actions like changing settings

Rotate API keys regularly. We recommend rotating API keys every 90 days or immediately if you suspect compromise. The dashboard shows last-used timestamps to help identify unused keys.

Data storage and residency

All application data is stored within your cloud account in the region you choose. Confident AI (the company) has no access to your data—everything remains in your infrastructure.

Data typeStoragePurpose
User dataPostgreSQL databaseProjects, settings, user preferences
Traces & spansPostgreSQL databaseLLM application telemetry
Evaluation resultsPostgreSQL databaseMetric scores, test runs, experiments
DatasetsPostgreSQL database + Object storageGolden datasets, uploaded files
Audit logsCloud logging serviceSecurity and compliance auditing

Data residency: Your data never leaves the region you deploy to. This is critical for organizations with GDPR, data sovereignty, or regulatory requirements that mandate data stay within specific geographic boundaries.

Data retention

Retention periods are configurable per data type, allowing you to meet compliance requirements while managing storage costs. Data deletion is handled automatically based on your configured policies.

Data typeDefault retentionConfigurable
Traces & spans90 daysYes
Evaluation resultsIndefiniteYes
Uploaded files30 daysYes
Audit logsPer cloud provider defaultsYes
Application logs14 daysYes

Deletion is permanent. Once data exceeds its retention period, it’s automatically deleted and cannot be recovered. Ensure your retention settings align with your compliance and business requirements before deployment.

Retention periods are fully configurable. Contact your Confident AI representative to adjust based on your compliance requirements or modify settings in the application configuration.

Encryption

All data is encrypted both in transit and at rest using cloud-native encryption services. Encryption keys are managed within your cloud account—Confident AI does not have access to your encryption keys.

LayerMethod
In transitTLS 1.2+ for all internal and external traffic
At rest (database)Cloud-managed encryption (AWS KMS, Azure Key Vault, GCP Cloud KMS)
At rest (storage)Cloud-managed encryption with bucket/container policies
SecretsCloud secrets manager with encryption (AWS Secrets Manager, Azure Key Vault, GCP Secret Manager)

Encryption key management

OptionDescriptionRecommended for
Cloud-managed keysDefault encryption using cloud provider’s managed keysMost deployments
Customer-managed keys (CMK)You create and control the encryption keysRegulated industries, specific compliance requirements
BYOK (Bring Your Own Key)Import keys from your HSMMaximum control, on-premise HSM integration

Default is secure. Cloud-managed encryption meets most security requirements. Customer-managed keys add operational complexity but provide additional control for organizations that require it.

Logging and audit

Comprehensive logging is enabled by default for security monitoring and compliance. All logs are stored within your cloud account using native logging services.

Log typeContentsRetention
Application logsService logs, errors, request tracesConfigurable
Access logsLoad balancer access, API requestsConfigurable
Audit trailCloud API calls, IAM actions, resource changesPer compliance requirements
Database logsConnection logs, slow queries (optional)Configurable

What’s logged

User actions:

  • Login/logout events (via SSO)
  • Project creation, modification, deletion
  • Dataset uploads and modifications
  • Evaluation runs and results access
  • API key creation and usage

System events:

  • Service health and errors
  • Database connections and queries
  • External API calls (LLM providers)
  • Resource scaling events

PII in logs: Application logs may contain user-provided data (prompts, responses) depending on your tracing configuration. Review your logging settings and apply masking rules if needed to prevent sensitive data in logs.

Compliance considerations

Self-hosted Confident AI supports various compliance frameworks by design:

FrameworkHow self-hosting helps
GDPRData stays in your chosen EU region, you control retention and deletion
SOC 2Deploy within your existing SOC 2 boundary, inherit your controls
HIPAAKeep PHI in your compliant environment, sign BAAs with cloud provider
FedRAMPDeploy in FedRAMP-authorized regions with your ATO
Data sovereigntyData never leaves your geographic boundary

Your compliance, your controls. Self-hosting means Confident AI inherits your organization’s compliance posture. Work with your compliance team to ensure the deployment meets your specific requirements.

Security checklist for your team

Before approving deployment, your security team should verify:

  • Network architecture reviewed and approved
  • VPN/private connectivity plan confirmed
  • SSO integration method selected (SAML/OIDC)
  • Data retention policies defined
  • Encryption key management approach decided
  • Logging and monitoring integration planned
  • Outbound access rules for LLM providers approved
  • Incident response procedures updated to include Confident AI

Next steps

Once your security team has reviewed this information, proceed to the deployment guide for your chosen cloud provider: