Server-side authorization
Policies stored as data, not code. Every read and write path is intercepted before any database operation. Deny rules outrank allow rules. Permissions are scoped by tenant, team, or individual ownership.
Sovereign AI Platform · Private inference for regulated enterprises
Private LLM inference with a tamper-evident audit log, dual-host cryptographic attestation per response, NIST post-quantum signatures, and on-shore hardware. Your auditor can verify any inference offline, without contacting us.
Designed against HIPAA, SOC 2 Type II, OCC SR 11-7, and EU AI Act Article 12 logging requirements.
Why this exists
Your data passes through a shared tenant. Your audit log is the vendor's database. The model version can change silently between your evaluation and your production traffic. There is no cryptographic proof that the response you got is the response that was sent — only the vendor's word.
For the kinds of decisions a regulated business automates with AI — credit, claims, diagnostic suggestions, sanctions screening, contract review — that gap is the gap a regulator asks about. Sovereign AI Platform closes it.
The four guarantees
Policies stored as data, not code. Every read and write path is intercepted before any database operation. Deny rules outrank allow rules. Permissions are scoped by tenant, team, or individual ownership.
Authenticated identity is verified against the claimed tenant before a query is constructed. Schema-level separation in production. The audit log uses denormalized tenant identifiers so it survives tenant deletion for retention requirements.
Every inference event is signed by two physically separate servers using NIST FIPS-204 post-quantum signatures. Every audit row carries a hash chain over the previous row's bytes. Forging an entry requires compromising both hosts and breaking the chain at every subsequent row.
Once an hour the platform commits a Merkle root of the audit log to a public blockchain. Your auditor independently rebuilds the tree from the rows, recomputes the root, and verifies on-chain. Tampering becomes mathematically detectable, not vendor-attested.
How a request flows
Compliance mapping
Each regulator's audit log requirement is satisfied by the same underlying architecture. Procurement teams can map requirements line by line.
| Regulator / framework | Specific requirement | Platform feature that satisfies it |
|---|---|---|
| HIPAA Security Rule | Audit controls (§164.312(b)) — record and examine activity in systems that contain ePHI. | Append-only, hash-chained audit log; per-tenant isolation; long-term R2 archival with object retention. |
| SOC 2 Type II — CC7 | System monitoring, change management, evidence of detection and response. | Every privileged action is logged with cryptographic chain link; chain verification endpoint exposed for auditor. |
| OCC SR 11-7 / Model Risk | Documented evidence of model version and inputs for every model decision. | Receipt binds model identifier and content hash; signed by two independent hosts; on-chain timestamp. |
| EU AI Act, Art. 12 | Automatic recording of events for high-risk AI systems, retained for traceability. | Per-event log with actor, time, outcome, model, tokens; tenant-scoped retention; auditor-verifiable chain. |
| NIST AI RMF — Manage 4.1 | Mechanisms to ensure system actions are traceable and verifiable post-hoc. | Dual-host post-quantum signatures (FIPS-204); offline verifier published. |
| FedRAMP / IL-4 (in roadmap) | Tamper-evident logs, on-shore data residency, FIPS-validated cryptography. | FIPS-204 ML-DSA-87 signatures; on-shore enterprise-grade GPU hardware; no third-country routing. |
Pricing
SMB
$2,500/mo
Mid-Market
$6,000/mo
Enterprise
$12,000/mo
Regulated
$18,000/mo
Annual contract pricing on request. Volume tiers above $50K/mo.
Trust signals
Every platform claim above corresponds to a public endpoint or a published artifact. Procurement teams can verify without an account, before any contract is signed.
GET /v1/pubkeys — published platform pubkeys.POST /v1/verify — independently verifies any receipt.GET /audit/anchors — every Merkle root with its on-chain transaction hash.GET /audit/verify-chain — recomputes the chain and reports the first broken link, if any.Request enterprise access
A response within one business day. We respond from a named human at ZC Technologies, not a queue.