Security and Deployment
OramisAI is enterprise software, not a SaaS platform. It runs inside your own infrastructure, using your own API keys, with no shared tenancy and no vendor data access by default.
Deployment Architecture
All components shown below run inside your infrastructure. OramisAI itself never sees your data.
Security Principles
No prompts, responses, or memory data leave your infrastructure unless explicitly configured. OramisAI operates entirely within your perimeter.
OramisAI routes through your own model subscriptions. Your keys are held in your environment and never transmitted to OramisAI systems.
Each deployment is fully isolated. Your instance does not share infrastructure, databases, or compute with any other customer.
GDPR-aligned architecture. PII detected and anonymised before external transmission. Data subjects protected by architecture, not policy alone.
Every interaction logged with full attribution: user ID, timestamp, model, policy decisions, memory injections, and overrides. Tamper-evident and exportable.
Granular permissions enforced at every layer. No user accesses functionality beyond their assigned role, regardless of technical access.
Compliance Posture
OramisAI is designed for organisations operating under regulatory obligations. The architecture aligns to major compliance frameworks, with audit documentation available on request.
Government, financial services, legal, and healthcare organisations have specific requirements around data sovereignty and AI governance. OramisAI is built with these in mind from the ground up.
Discuss your requirementsPII detection and anonymisation built into the data flow. No cross-border transfer of personal data without explicit configuration.
Controls mapped to SOC 2 Type II trust service criteria. Full documentation and third-party assessment support available.
Information security controls aligned to ISO 27001. Access controls, audit logging, incident management, and data classification supported natively.
Deploy in your chosen region. Full control over data residency, processing location, and cross-border transfer restrictions.
We work through security reviews and compliance assessments with every customer.