Security Architecture
Last Updated: November 10, 2025
Alkemy is built for consulting firms that handle highly sensitive client information and proprietary methodologies. We understand that your intellectual property is your competitive advantage, and protecting it is non-negotiable. That's why we're building security into every layer of our architecture from day one.
Our Security Philosophy
We're in the early stages of building Alkemy, but security isn't something we'll add later—it's foundational to how we're building the product. Our approach is simple:
- Zero data exfiltration: Your data never leaves your control
- Deployment flexibility: Choose the level of isolation that matches your risk profile
- Open architecture: Not locked to any single AI provider
- Single-tenant by default: Your data is isolated from other firms
Deployment Options
We offer three deployment models so you can choose the security posture that fits your requirements:
SaaS (Multi-Tenant)
Hosted by us with complete data isolation between firms. Each customer's data is stored in separate databases with encrypted access controls. Best for firms that want fast deployment without infrastructure management.
Best for: Boutique firms (10-50 employees) prioritizing speed and ease of use
VPC (Virtual Private Cloud)
Dedicated infrastructure deployed in your AWS account. You control the network, access policies, and compliance boundaries. We deploy and manage the application, but the data never leaves your cloud environment.
Best for: Mid-size firms (50-200 employees) with existing AWS infrastructure and compliance requirements
On-Premises
Fully air-gapped deployment in your data center. Complete control over infrastructure, network, and data. We provide the software and deployment support, you own and operate everything.
Best for: Large firms or those with strict data residency requirements
Zero Data Exfiltration
Your consulting IP is your competitive advantage. We've designed Alkemy to ensure your data is never used for anything beyond serving your firm:
- No training on your data: We will never use your documents, projects, or methodologies to train AI models
- Open source LLM support: Use Claude, GPT-4, Gemini, or open-source models like DeepSeek and Qwen. You're not locked to any vendor.
- Your infrastructure, your rules: With VPC or on-premises deployment, your data never touches our servers
- Audit logs: Track every access to your knowledge graph with comprehensive audit trails
Architecture for Data Isolation
Alkemy is built on a knowledge graph architecture that provides natural data isolation:
- Neo4j property graph: Each firm's data lives in a separate database instance with no cross-contamination
- Single-tenant by default: Following the Palantir model, every customer gets isolated infrastructure
- Encrypted at rest: All data stored using AES-256 encryption
- Encrypted in transit: All communications use TLS 1.3
- Role-based access control: Granular permissions for who can access what within your firm
AWS Foundation
We're building on Amazon Web Services (AWS) for reliability and security:
- Enterprise-grade infrastructure: AWS provides the foundation with SOC 2, ISO 27001, and other certifications
- Infrastructure as code: Consistent, repeatable deployments using Terraform/CloudFormation
- AWS security features: VPC isolation, security groups, IAM roles, KMS encryption
- Regional data residency: Deploy in AWS regions that meet your compliance requirements (US, EU, etc.)
Our Commitment to Security
We're an early-stage company, and we want to be transparent about where we are and where we're going:
What We Have Today
- Security-first architecture with data isolation built in from day one
- Flexible deployment options (SaaS, VPC, on-premises)
- Encryption at rest and in transit as standard
- Open source LLM support to prevent vendor lock-in
- Development on AWS infrastructure with infrastructure-as-code
Our 2026 Roadmap
- Q1 2026: Third-party security audit and penetration testing
- Q2 2026: SOC 2 Type I certification process begins
- Q3 2026: GDPR compliance validation for European customers
- Q4 2026: SOC 2 Type II certification
- 2027+: ISO 27001, FedRAMP (for government contractors)
Data Encryption Standards
All data is protected using industry-standard encryption:
- At rest: AES-256 encryption for all stored data (documents, knowledge graph, embeddings)
- In transit: TLS 1.3 for all network communications
- Backups: Encrypted backups with separate encryption keys
- Key management: AWS KMS for encryption key management in cloud deployments
Access Controls
We implement strict access controls at every level:
- Multi-factor authentication: Required for all user accounts
- Role-based access control (RBAC): Granular permissions based on job function
- Principle of least privilege: Users and systems only get access they need
- Audit logging: All access to sensitive data is logged and retained
- Session management: Automatic timeout and secure session handling
Working with Open Source AI Models
One of our key security differentiators is support for open source LLMs:
- No vendor lock-in: Choose Claude, GPT-4, Gemini, or run DeepSeek/Qwen in your own infrastructure
- Data residency control: Open source models can run entirely within your VPC or on-premises
- Cost optimization: Use cheaper open source models for routine tasks, save premium models for complex analysis
- Future-proof: As AI models evolve, you're not locked to a single vendor's roadmap
Responsible Disclosure
If you believe you've discovered a security vulnerability in our systems, we want to hear from you. We're committed to working with the security research community to keep Alkemy secure.
Please report security issues responsibly:
- Email: innovate@devdashllc.com with subject line "Security Disclosure"
- Include detailed steps to reproduce the issue
- Give us reasonable time to address the issue before public disclosure
- We'll acknowledge your report within 48 hours and keep you updated on our progress
Questions About Security
Security is an ongoing conversation. If you have questions about our security practices, want to discuss your specific requirements, or need additional documentation:
Contact us:
Email: innovate@devdashlabs.com
Why This Matters for Consulting Firms
Consulting firms live and die by their intellectual property. Your methodologies, client relationships, and project insights are what differentiate you from competitors. We understand that trust isn't built with compliance badges alone—it's built by giving you control over your data. Whether you need the simplicity of SaaS or the isolation of on-premises deployment, we're building Alkemy to protect what matters most: your competitive advantage.