← All Articles

SecureAI Security Architecture

security-compliance beginner security architecture encryption data-protection infrastructure model-providers

SecureAI's security architecture is designed to protect automotive aftermarket data at every layer — from the browser to the database to external AI model providers. This article explains the technical security controls, encryption standards, storage architecture, and data flow protections that secure your organization's information.

Architecture Overview

SecureAI runs on Google Cloud Platform (GCP) Cloud Run and follows a layered security model:

┌─────────────────────────────────────────────────┐
│  Users (Browser / API Clients)                  │
│  ── TLS 1.2+ ──────────────────────────────     │
├─────────────────────────────────────────────────┤
│  Cloud Run Frontend (HTTPS-only)                │
│  ── mTLS ───────────────────────────────────    │
├─────────────────────────────────────────────────┤
│  API Server (Authentication + Authorization)    │
│  ── mTLS ───────────────────────────────────    │
├─────────────────────────────────────────────────┤
│  Data Layer            │  Model Providers       │
│  (Encrypted at rest)   │  (TLS, no retention)   │
└─────────────────────────────────────────────────┘

Each layer enforces its own security boundary. A compromise at one layer does not automatically grant access to another.

Encryption in Transit

All data moving between components is encrypted:

Connection Protocol Minimum Version Details
Browser → SecureAI TLS 1.2 HTTP automatically redirected to HTTPS. HSTS headers enforced.
API clients → SecureAI TLS 1.2 Bearer token authentication required for all API endpoints.
Frontend → API server mTLS 1.2 Mutual TLS between internal services within the Cloud Run environment.
API server → Database mTLS 1.2 Database connections authenticated and encrypted.
API server → Model providers TLS 1.2 All outbound requests to AI model APIs use encrypted connections.
API server → Cloud Storage TLS 1.2 Document upload and retrieval over encrypted channels.

TLS Configuration

Encryption at Rest

All stored data is encrypted using AES-256:

Data Type Storage Location Encryption Method Key Management
Conversation history Cloud SQL (PostgreSQL) AES-256 server-side GCP-managed keys (default) or CMEK
Uploaded documents Cloud Storage AES-256 server-side GCP-managed keys (default) or CMEK
User account data Cloud SQL (PostgreSQL) AES-256 server-side GCP-managed keys (default) or CMEK
Audit logs Cloud SQL (PostgreSQL) AES-256 server-side GCP-managed keys (default) or CMEK
Database backups Cloud Storage AES-256 server-side Same key policy as source data
Temporary processing files In-memory only Not persisted to disk N/A — cleared after request completes

Customer-Managed Encryption Keys (CMEK)

Organizations with stricter key management requirements can use CMEK through GCP's Key Management Service (KMS):

Storage Architecture

Data Storage Locations

SecureAI stores data in three primary locations:

1. Cloud SQL (PostgreSQL)

2. Cloud Storage

3. In-Memory Processing

Data Residency

Data storage is region-specific:

Region GCP Location Use Case
United States (default) us-central1 (Iowa) Default for all organizations
European Union europe-west1 (Belgium) Available for organizations with EU data residency requirements
Additional regions Contact account representative Available for enterprise agreements

All stored data — conversations, documents, user accounts, audit logs, and backups — resides in the selected region. Changing regions after deployment requires a planned migration coordinated with your account representative.

Model Provider Data Handling

When SecureAI sends a prompt to an AI model provider, specific protections apply:

What Is Sent to Model Providers

What Is NOT Sent to Model Providers

Provider Data Protection Guarantees

Protection Details
No training on your data SecureAI's agreements with model providers prohibit using your input or output data for model training, fine-tuning, or improvement.
No data retention Model providers are contractually required to delete your data after generating a response. No input or output is retained beyond the API request lifecycle.
Prompt isolation Each API request is independent. Your prompts are not mixed with other users' or organizations' data.
Transport encryption All communication with model providers uses TLS 1.2+.

Supported Model Providers

SecureAI supports multiple model providers. Each provider's data handling is governed by SecureAI's data processing agreements:

Your administrator selects which providers are available. See Adding Custom Model Providers for configuration details.

Network Security

Perimeter Controls

Internal Network

Authentication and Authorization

Authentication

SecureAI supports multiple authentication methods:

Method Details
Local accounts Email/password with optional MFA. Passwords are hashed using bcrypt with a minimum cost factor of 12.
SAML SSO Federated authentication via your organization's identity provider (Okta, Azure AD, Auth0).
OIDC SSO OpenID Connect-based authentication for compatible identity providers.
API tokens Bearer tokens for programmatic access. Tokens are scoped to specific permissions and can be revoked by administrators.

Authorization

Vulnerability Management

Security Monitoring

Frequently Asked Questions

Is my data encrypted?

Yes. All data is encrypted both in transit (TLS 1.2+) and at rest (AES-256). Organizations requiring additional key control can use Customer-Managed Encryption Keys (CMEK).

Can AI model providers see my data?

Model providers process your prompts to generate responses, but they cannot retain, store, or use your data for training. This is enforced by SecureAI's data processing agreements with each provider.

Where is my data physically stored?

By default, in GCP's us-central1 region (United States). EU data residency (europe-west1, Belgium) is available on request. Additional regions are available for enterprise agreements.

Can I use my own encryption keys?

Yes. CMEK support is available for enterprise service agreements. Your organization controls key lifecycle through GCP's Key Management Service.

How does SecureAI prevent cross-tenant data access?

Tenant isolation is enforced at multiple layers — application-level authorization checks, database-level row isolation, and storage-level object organization by organization ID. All queries include organization scope, and there is no mechanism for cross-tenant access.

Does SecureAI store data on local devices?

No. All data is stored server-side in GCP. No conversation data, documents, or credentials are persisted on end-user devices.

Related Articles

Questions

For security architecture questions, to request penetration test reports, or to discuss CMEK configuration, contact your account representative.