Customer data used to train models
No
Customer data and prompts are not used to train foundation models.
AI Data Security
DataSafeHouse supports procurement, security, and architecture review with direct answers on model training, deployment boundaries, data isolation, and supported AI supplier options.
Customer data used to train models
Customer data and prompts are not used to train foundation models.
Deployment options
Deployments can be delivered inside a customer-managed environment, including on-premises infrastructure or an AWS VPC.
Tenant and data isolation
Tenant and application boundaries, scoped keys, and role-based administrative controls support customer-specific segregation.
Supplier model options
Supported model and provider options may include AWS Bedrock-based models, OpenAI-compatible endpoints, Gemini, and local or self-hosted models.
Artifacts Reviewed
Customer-specific data flow diagrams and deployment topology documentation are prepared during solution design and provided during architecture or security review.
Integration scope, connector boundaries, and authentication methods are documented per deployment based on the systems included in the engagement.
Architecture, deployment, and operational documentation are available during technical review, including platform control points and operational assumptions.
Supported deployment models include customer-managed on-premises environments and AWS VPC deployments.
Questionnaire Answers
DataSafeHouse applies governance through scoped administrative access, role-based console operations, policy inheritance, provider and model controls, rate limits, and audit-ready event telemetry.
Customer data and prompts are not used to train foundation models. Deployments can run on premises or in an AWS VPC, with deployment-specific network, access, and operations controls defined during implementation.
Provider and model access can be controlled through policy resolution at tenant and application scope, including explicit allowlists and request-time enforcement.
Tenant and application boundaries, scoped keys, role-based administrative permissions, and deployment-specific network boundaries support segregation and access control.
DataSafeHouse supports customer-specific tenant and application boundaries. Dedicated deployment models can be scoped according to customer requirements, including on-premises or AWS VPC environments.
DataSafeHouse does not use customer data or prompts to train foundation models.
Retention and disposal requirements are defined per deployment and customer policy. Environment-specific handling is documented during implementation and security review.
Supported model and provider options may include AWS Bedrock-based models, OpenAI-compatible endpoints, Gemini, and local or self-hosted models, depending on deployment design and customer policy.
Customer-specific evidence packages, architecture diagrams, integration inventories, and deployment-specific controls are typically provided during solution review or security due diligence.