Skip to main content
Customer-VPC Architecture

Zero-Phone-Home

G8KEPR runs entirely inside your infrastructure. Every AI prompt, MCP tool call, and verification decision is processed on your compute — nothing crosses your network boundary to G8KEPR cloud.

Data Flow

Where each data type goes — and where it stays.


  ┌─────────────────────────────────────────────────────────────────┐
  │                      YOUR VPC / NETWORK                         │
  │                                                                 │
  │  ┌──────────────────┐         ┌───────────────────────────────┐ │
  │  │  Your AI App     │──mTLS──►│  sensor-ai-gateway            │ │
  │  │  (LLM calls,     │         │  sensor-mcp                   │ │
  │  │   agents, chat)  │──/verify►│  sensor-verification          │ │
  │  └──────────────────┘         └───────────────┬───────────────┘ │
  │  ┌──────────────────┐                         │ CloudEvents      │
  │  │  MCP Server      │──mTLS──►────────────────┘                 │
  │  │  (tool calls)    │                         ▼                  │
  │  └──────────────────┘         ┌───────────────────────────────┐ │
  │                               │  Collector                    │ │
  │                               │  spool + dedup + HMAC chain   │ │
  │                               └───────────────┬───────────────┘ │
  │                                               │                  │
  │                               ┌───────────────▼───────────────┐ │
  │                               │  PostgreSQL (local)            │ │
  │                               │  Audit log · RLS enforced      │ │
  │                               │  7-year retention              │ │
  │                               └───────────────────────────────┘ │
  │                                               │ optional egress  │
  │                               ┌───────────────▼───────────────┐ │
  │                               │  Egress Firewall              │ │
  │                               │  (disable = full air-gap)     │ │
  └───────────────────────────────┼───────────────────────────────┘
                                  │ aggregated counts only
                    ┌─────────────▼────────────────┐
                    │  G8KEPR Cloud                │
                    │  metrics ingest · dashboard  │
                    │  NO prompt/response content  │
                    └──────────────────────────────┘

Data Classification

AI prompt / response text
Never leaves VPC
MCP tool call arguments
Never leaves VPC
API request / response bodies
Never leaves VPC
User PII or credentials
Never leaves VPC
Audit log content
Never leaves VPC
OPT
Aggregated event counts / metricscustomer-controlled
Optional
Threat signature updates (inbound)pull-only, on your schedule
Never leaves VPC

Six Zero-Phone-Home Guarantees

No AI content leaves your VPC

Every AI prompt, response, MCP tool call, and API payload is inspected inside your infrastructure. Nothing crosses your network boundary to G8KEPR cloud — not even anonymized excerpts.

Air-gap / offline mode

Block all outbound traffic entirely. Sensors operate at full capability using locally cached threat patterns. The collector spools to local PostgreSQL with 7-year retention.

HMAC-chained audit log — local

Every detection event is written to your PostgreSQL with a tamper-evident HMAC chain. G8KEPR can verify chain integrity during compliance audits without reading event content.

Zero latency added to AI calls

Sensors intercept traffic within your cluster over loopback/mTLS — no cross-region hop, no vendor proxy. Median overhead is sub-5 ms at p99.

Data sovereignty — any region

Deploy in your AWS, Azure, GCP, or on-prem Kubernetes cluster. Elected data residency (EU, US, APAC) is enforced at the infra layer — not a configuration flag.

Metrics only — never content

When egress is permitted, the collector transmits aggregated event counts and severity tallies. It never transmits prompt text, AI responses, tool arguments, or user data.

Customer-VPC vs. Cloud Proxy

Most AI security vendors route your traffic through their cloud. G8KEPR does not.

PropertyG8KEPRCloud Proxy
AI traffic routes through vendor infraNoYes
Vendor can read prompts / responsesNoYes
Air-gap / fully offline support
Latency from vendor proxy hopNoYes
Full data sovereignty
EU AI Act Art. 10 — data governance satisfied
HIPAA / FedRAMP on-prem option

Compliance Implications

EU AI Act Art. 10

AI data stays in your elected residency region. No cross-border transfer of training or inference data.

GDPR Art. 44–49

VPC-in-EU deployment requires no SCCs or adequacy decisions — data never leaves your EEA boundary.

HIPAA §164.312(a)(1)

PHI in AI prompts never leaves the covered entity's infrastructure. BAA scope stays clean.

SOC 2 CC6.6

G8KEPR has no logical access to customer data. Only aggregated metrics flow outbound.

Architecture Review for Enterprise

Our solutions engineering team walks through the deployment topology, network requirements, and compliance posture for your specific cloud and regulatory environment. Available for Enterprise prospects.