A plain-language view of how Aveya handles your data, the controls we provide, and the deployment options available for different security requirements.
Security principles
Aveya is designed around a small set of non-negotiables, with clarity over slogans.
How Aveya handles your data
This is the flow security reviewers care about: what’s stored, what’s transient, and what you can control.
- Ingest: Files connect from your sources (e.g. SharePoint, storage, exports) and are processed into searchable chunks.
- Store: Source content and derived indexes remain inside the deployment boundary (SaaS tenant or your Azure tenant).
- Retrieve: The platform retrieves only relevant snippets for a user’s question (with citations where applicable).
- Generate: A model is called with the retrieved context to produce an answer. The goal is grounded, verifiable output.
- Retain / delete: Retention and deletion are configurable by deployment model and customer policy.
If you need a deeper security pack (architecture, controls, data flow), we can provide it under NDA.
What’s stored. Source documents, derived search indexes (including chunks and embeddings), and access configuration remain within your deployment boundary, either your Azure tenant or a dedicated Aveya tenant.
What’s transient. Prompts, retrieval context, and model responses are processed per request to generate answers and are not reused for unrelated purposes.
Platform controls
The core areas security teams ask about: encryption, identity, boundaries, and auditability.
Deployment options
Choose the model that matches your governance and compliance requirements.
Fully managed (SaaS)
Aveya hosts and operates the platform with strong tenant isolation and regional hosting controls. This is the fastest path to value when infrastructure ownership is not required.
Self-hosted in your Azure
Deploy inside your own Azure subscription for full control over networking, policies, and security tooling. Preferred in regulated or high-control environments.
Compliance approach
Aveya is built on Azure services with established security and compliance programs. We focus on clear controls, reviewability, and deployment flexibility.
- Azure provides a strong baseline of certified infrastructure controls
- We support enterprise security questionnaires and reviews
- Additional documentation available under NDA where appropriate