Architecture
Security posture
This page is the long-form security view, written for vendor security questionnaires and lender-side technical advisors. We are seed-stage and honest about what is shipping today, what is in design, and what is on the formal-audit roadmap.
Posture · pilot-ready
PILOT-READY · CUSTOMER-VPC OR DEDICATED · FORMAL AUDIT PLANNED 2027.
Deployment posture
Every pilot runs as a customer-isolated deployment by default. There is no shared multi-tenant data path. The runtime can be deployed inside the buyer's own cloud account (customer-VPC) or inside a dedicated Felixfusion account whose data plane is provisioned per engagement.
When deployed inside the buyer's VPC, no source documents, derived artifacts, or audit logs leave that account. The buyer holds the keys, the buyer holds the logs, and the buyer can revoke access without our involvement.
Encryption + key management
TLS 1.2 or higher for every network path the runtime touches. AES-256 for at-rest encryption on every storage primitive (object store, document database, audit log).
Key management is delegated to the cloud provider's KMS. Customer-managed keys (CMK) are supported in scoped deployments where the buyer's procurement, security, or legal team requires it. Key-handoff is documented per engagement.
Isolation + tenancy
Each pilot runs in its own sandboxed execution context. There is no shared state between pilots, no cross-tenant data paths, and no shared model-fine-tuning surface that could leak private content from one engagement into another.
Agent workers carry per-engagement credentials issued at runtime. Credentials are short-lived and rotated automatically. Long-lived shared credentials are not used.
Audit log + provenance
Every agent generation, every human review, every approval, every revision is written to an append-only audit log. The log is exportable on request in a structured format suitable for an external review.
Every agent claim is provenanced. A reviewer can open any sentence in any draft and trace it back to the specific page, table, or row in the source material. We are not running an opaque-embedding stack.
Governance + human gates
No agent output leaves the system without a human approval. Every external artifact (DD pack, IC memo, compliance brief, redline, award memo) is generated as a draft, flagged for review, and held until a senior-analyst or procurement-lead signature lands.
The review interface shows the draft alongside the source trail. Approving is a signed event. Rejecting routes back to the generating agent with structured feedback, not free-form prompt drift.
HOW THE RUNTIME HANDLES YOUR DATA
Four operating commitments, visualised.
Institutional buyers run vendor security questionnaires before a first call. The runtime is engineered around four commitments that show up on every questionnaire, and we surface them at the page level so the conversation starts where it should.
No shared data path.
Every pilot runs inside the buyer's own cloud account. Source documents, derived artifacts, and audit logs never leave that account.
Every claim links to a page.
Open any sentence in a draft, see exactly which page, table, or row produced it. No opaque embeddings.
Nothing leaves without a signature.
Parse, State, Score, Draft, Approve. The fifth gate is a senior human; everything before is structured prep.
Key custody stays with you.
Customer-managed keys (CMK) supported in scoped deployments. Revocable at any time, no Felixfusion involvement required.
Compliance + frameworks
Design informed by NIST 800-53 (Rev 5), SOC 2 Type II, and ISO 27001 controls. We are not SOC 2 certified today; formal audit is on our 2027 roadmap and we will publish the attestation when it lands.
For energy-procurement scopes Nexus carries operational awareness of UFLPA (Uyghur Forced Labor Prevention Act), IEC 62933 / UL 9540 / NFPA 855 (BESS), IEC 61215 / IEC 61400 (solar / wind), and ICV (in-country value) rule sets. These are runtime concerns, not security frameworks, but they sit inside the same governance envelope.
Data residency + retention
Default data residency is the buyer's region. We do not move source documents or derived artifacts across regions without an explicit consent record per engagement.
Default retention is the engagement window plus an agreed audit-readiness tail (typically 12 months). Earlier deletion is supported on request. Right to export is unconditional.
Subprocessors
The runtime relies on a short, named subprocessor list: cloud infrastructure, model providers, and observability. The current list is provided per pilot during the security questionnaire phase. Changes to the list are notified in advance, not after the fact.
Vendor security questionnaire
We respond to vendor security questionnaires (CAIQ, SIG-Lite, custom institutional questionnaires) within five business days during pilot scoping. Send the form via the contact page or book a 30-min security review and we will route it to engineering on day one.