Security & Deployment

Your data stays yours. Access is enforced at every layer.

Golden Retriever is built for organizations that take data security, access control, and model governance seriously. This page outlines how the platform handles your data, who can access what, and where the system runs.

🔒
Access Control — Live Enforcement
SL
✓ Confluence ✓ Git Repos ✓ K8s Clusters ✗ Financial DB ✗ HR Systems
MR
✓ Confluence ✗ Git Repos ✗ K8s Clusters ✓ Financial DB ✓ HR Systems
Query
“Show me Q3 revenue by account”
Michael R. — Result returned from Financial DB
Sarah L. — Access denied (no Financial DB permission)

Role-based access control (RBAC).

Access control in Golden Retriever is enforced at the retrieval layer, not the interface layer. This means permissions are checked every time data is retrieved — not just when a user logs in or opens a page.

Permissions are inherited from your existing systems: Active Directory, Confluence spaces, database roles, and file share ACLs. If a user does not have access to a document in SharePoint, they will not see it in Golden Retriever. There is no separate permission system to manage, no additional roles to configure, and no access lists to maintain.

The result is a system that respects your existing security posture without adding administrative overhead.

Engineer
Confluence Git Repos K8s Clusters Financial DB HR Systems
Manager
Confluence Git Repos K8s Clusters Financial DB HR Systems
Executive
Confluence Git Repos K8s Clusters Financial DB HR Systems
Authorized No Access

No training on your data. No data retention beyond retrieval.

🚫

No model training

Your data is never used to train AI models. This is not a policy decision — it is a hard architectural boundary. There is no mechanism in the system to feed your data back into model training, and there never will be.

🔎

Index only, no storage

Data is not stored beyond what is necessary for indexing and retrieval. Documents are processed, chunked, and embedded for semantic search. The original content remains in your source systems — Golden Retriever holds only the index.

Real-time database queries

Query results from databases are generated in real time and are not persisted. When a user asks a question that requires a database query, the system executes the query, returns the result, and discards the data. Nothing is cached or stored.

Full control over where your data lives and which models process it.

🏭

On-premises with local LLMs

Complete data sovereignty. All processing happens within your data centers using locally hosted language models. No data leaves your network, no external APIs are called. Suitable for air-gapped and classified environments.

Azure cloud with US-hosted models

Data does not leave the Azure cloud boundary. Models are hosted within US regions, and all processing stays within your cloud environment. You maintain full control over the tenant and the data lifecycle.

🔒

Private cloud

A dedicated, isolated cloud environment provisioned exclusively for your organization. Combines the scalability of cloud infrastructure with the isolation characteristics of an on-premises deployment.

Three deployment models. Same platform.

Every deployment option delivers the full platform — same capabilities, same integrations, same security posture. The only difference is where the infrastructure runs.

🏭

On-Premises

Deploy entirely within your own data centers. Supports locally hosted LLMs for complete data sovereignty. No external network dependencies. Suitable for air-gapped environments and highly regulated industries.

Typical fit: Highly regulated industries, government, defense.
☁️

Private Cloud

A dedicated, isolated cloud environment provisioned exclusively for your organization. Cloud scalability with on-premises-level isolation. No shared tenancy, no shared resources.

Typical fit: Organizations wanting cloud elasticity without shared tenancy.
🚀

SaaS (Hosted)

We host the platform on our private Azure cloud with US-hosted models. Fastest path to deployment with no infrastructure overhead. Fully managed, continuously updated.

Typical fit: Organizations wanting a fully managed solution with minimal operational burden.

Questions about security, compliance, or deployment?

We are happy to walk through our security architecture in detail — including data handling, access control enforcement, model residency, and deployment topology for your specific environment.