A plain-language orientation for security reviewers: how data is handled, what controls exist, which deployment options are available, and what to expect during review.
Security principles
A small set of operating assumptions, written for practical security review.
How Aveya handles your data
A reviewer-focused flow: what is stored, what stays transient, and what you control.
- Ingest: Files connect from your sources (for example SharePoint, storage, or exports) and are processed into searchable chunks.
- Store: Documents and derived indexes remain inside the deployment boundary (Managed Deployment or your Azure tenant).
- Retrieve: Only relevant snippets are retrieved for a user’s question, with citations where applicable.
- Generate: The model uses the retrieved context to produce a grounded answer.
- Retain / delete: Retention and deletion follow your deployment configuration and policy.
If you need deeper detail on architecture, controls, or data flow, we can provide it under NDA.
What’s stored. Source documents, derived search indexes (chunks and embeddings), and access configuration remain inside your deployment boundary.
What’s transient. Prompts, retrieval context, and model responses are processed per request and are not reused for unrelated purposes.
Platform controls
Core control domains security teams evaluate: encryption, identity, boundaries, and auditability.
Deployment options
Choose the model that matches your governance, networking, and compliance requirements.
Managed Deployment
Aveya hosts and operates the platform with strong tenant isolation and regional hosting controls. This is the fastest path to value when infrastructure ownership is not required.
Private Deployment in your Azure tenant
Deploy inside your own Azure subscription for full control over networking, policies, and security tooling. Preferred in regulated or high-control environments.
Compliance approach
Aveya is built on Azure services with established security and compliance programs. We focus on clear controls, reviewability, and deployment flexibility.
- Azure provides a strong baseline of certified infrastructure controls
- We support enterprise security questionnaires and reviews
- Additional documentation available under NDA where appropriate