Public / Technical
Security Architecture: The Zero-Retention Enclave
Document ID: NS-SEC-2025-V1Version: 1.0Classification: Public
Executive Summary
Enterprises face a paradox: the need for high-leverage automation versus the risk of data exposure. Northstar solves this with a Zero-Retention Architecture: data is processed in ephemeral memory for the duration of an execution cycle and then scrubbed.
1. Non-Persistence of PII/PHI
- Ephemeral Processing: session data is held in volatile memory for the duration of a workflow execution cycle.
- Memory Erasure: context is explicitly purged on the final state transition.
- Log Sanitization: automated scrubbers prevent PII/PHI from entering application logs.
2. Deterministic Logic vs. Probabilistic Risk
We separate probabilistic extraction from deterministic execution. AI is used for classification and structured extraction; business logic is executed via explicit state-machine transitions and guarded tool calls.
- Boundaries: the model cannot directly execute writes, transactions, or side effects.
- Execution: actions require tool schemas, validations, and (when configured) human approvals.
3. Deployment Topology
- Shared Multi-tenant: isolated enclaves in our managed infrastructure.
- Dedicated Enclave: private VPC instance dedicated to a single customer.
- On-Prem / Hybrid: worker runtime executes inside your network and only calls the state machine core over encrypted tunnels.
4. Compliance Ready
Our architecture is designed to satisfy common enterprise security requirements:
- SOC 2 Type II: auditable controls, logging discipline, and vendor management.
- GDPR: data minimization and right-to-erasure by default.
- HIPAA: BAA-ready deployments available for healthcare-adjacent workflows.
For deep-dive technical audits, contact security@northstaragents.ai.