Skip to main content

AI Data Security at Strike Graph

Micah Spieler avatar
Written by Micah Spieler
Updated over 2 weeks ago

How We Use AI

Strike Graph leverages artificial intelligence to help automate compliance workflows and analyze evidence more efficiently. Our AI systems read data from the attachments and documents you provide to assist with tasks like evidence classification, questionnaire responses, and compliance analysis.

Data Handling and Protection

Encryption: All data processed by our AI systems is encrypted both at rest and in transit, ensuring your information remains secure throughout the entire workflow.

Infrastructure: We do not use third-party AI APIs. All of our AI capabilities are built within our own AWS Virtual Private Cloud (VPC) environment, behind our firewalls. We access AI models directly through our AWS account, maintaining complete control over the infrastructure.

Data Storage: Data processed by our AI systems is stored exclusively in our owned datastores within our secure environment. Access is restricted to authorized personnel and systems only.

Model Training: Your data is never used directly to train large language models. The information you provide to Strike Graph remains yours and is used solely to deliver our compliance platform services to you.

Our AI Security Philosophy

At Strike Graph, we believe AI should be trustworthy, especially when handling sensitive compliance evidence. Our approach to building AI tools follows these core principles:

  • Secure by Design: We architect AI features with security as a foundational requirement, not an afterthought

  • Complete Control: By keeping AI operations within our controlled infrastructure, we maintain oversight of the entire data flow

  • Observable Systems: Our AI implementations are designed to be monitored and audited, providing visibility into how data is processed

  • Privacy First: We build AI capabilities that respect data privacy and give you confidence that your sensitive information is handled appropriately

This architecture ensures that our AI usage aligns with stringent security requirements and provides the transparency needed to demonstrate responsible AI practices to your auditors and stakeholders.

Did this answer your question?