Why AI Security Is Different
Enterprise AI platforms present unique security challenges that traditional SaaS security models do not fully address. An AI system does not just store data — it processes, transforms, and generates new data based on inputs that may include proprietary business information, customer records, and strategic plans. The attack surface is broader, the potential for data leakage is greater, and the compliance implications are more complex.
When an employee pastes a confidential contract into an AI tool, that content becomes part of a processing pipeline. Where does it go? Who can access the outputs? Is it retained? Can it influence responses to other users? These questions demand answers that go beyond standard SOC 2 checkboxes.
Alfred's Enterprise Platform is built from the ground up with these concerns in mind. Every feature — from authentication to model inference — operates within a security framework designed for organizations that handle sensitive data and operate under regulatory oversight.
Single Sign-On (SSO) Integration
SSO is the foundation of enterprise identity management. It ensures that employees access AI tools through the same identity provider (IdP) that governs all other corporate applications, eliminating password sprawl and enabling centralized access control.
Supported Protocols
Alfred supports the three dominant SSO standards:
- SAML 2.0: The most widely deployed enterprise SSO protocol. Alfred integrates with any SAML 2.0 compliant identity provider including Okta, Azure AD, OneLogin, PingFederate, and ADFS. Configuration requires exchanging metadata documents — typically completed in under an hour.
- OpenID Connect (OIDC): The modern, OAuth 2.0-based SSO standard preferred by cloud-native organizations. Alfred supports OIDC with any compliant provider, including Auth0, Keycloak, and Google Workspace.
- LDAP/Active Directory: For organizations that require direct directory integration. Alfred's LDAP connector supports both standard LDAP and Microsoft Active Directory with secure LDAPS connections.
SSO Configuration
{
"sso": {
"protocol": "saml2",
"idp_metadata_url": "https://your-idp.com/metadata.xml",
"entity_id": "https://alfred.gositeme.com/sp",
"acs_url": "https://alfred.gositeme.com/auth/saml/callback",
"name_id_format": "emailAddress",
"attribute_mapping": {
"email": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
"name": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name",
"role": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/role",
"department": "custom:department"
},
"enforce_sso": true,
"jit_provisioning": true
}
}
Just-In-Time Provisioning
When jit_provisioning is enabled, new users are automatically created in Alfred when they authenticate through SSO for the first time. Their role and permissions are derived from IdP attributes, eliminating the need for manual user provisioning. When a user is deactivated in your IdP, their Alfred access is revoked immediately at the next authentication attempt.
Role-Based Access Control (RBAC)
RBAC ensures that every user has access to exactly the tools and data they need — no more, no less. This principle of least privilege is fundamental to enterprise security and is increasingly required by compliance frameworks.
Alfred's Role Hierarchy
Alfred implements a hierarchical RBAC model with four default roles and support for custom roles:
| Role | Permissions | Typical Users |
|---|---|---|
| Organization Admin | Full access. Manage users, roles, billing, SSO, data policies, and all tools. | IT admins, CTO |
| Team Manager | Manage team members, assign tool access, view team usage analytics. Cannot modify org-level settings. | Department heads |
| Power User | Access assigned tool categories, create agents, use fleet dashboard. Cannot manage users. | Developers, analysts |
| Standard User | Access assigned tools only. Cannot create agents or access fleet management. | General employees |
Custom Roles
Default roles cover common scenarios, but enterprises often need finer-grained control. Alfred's custom role builder lets you define permissions at the tool level:
{
"role": "Legal Team",
"permissions": {
"tools": {
"allow": ["legal-*", "document-*", "compliance-*", "content-writer"],
"deny": ["code-*", "devops-*", "database-*"]
},
"agents": {
"create": true,
"manage_own": true,
"manage_all": false
},
"data": {
"export": true,
"bulk_delete": false,
"view_audit_log": true
},
"fleet": {
"access": false
}
}
}
The wildcard syntax (legal-*) simplifies permission management for Alfred's large tool library. Instead of listing hundreds of individual tools, you grant access to categories. The deny rules take precedence over allow rules, providing a safety net against accidental over-permissioning.
Resource-Level Permissions
Beyond tool access, RBAC extends to specific resources:
- Projects: Users can be granted access to specific projects, preventing cross-team data visibility
- Agents: Custom AI agents can be shared with specific users or teams, or kept private
- Context documents: Uploaded knowledge base documents inherit project-level permissions
- API keys: Each key has its own permission scope, supporting the principle of least privilege for integrations
Audit Logging
Comprehensive audit logging is not optional for enterprises — it is a regulatory requirement under frameworks including SOC 2, ISO 27001, HIPAA, and Canada's PIPEDA. Alfred's audit system captures every significant action with immutable, tamper-evident logs.
What Gets Logged
Alfred records audit events across five categories:
- Authentication events: Login, logout, failed login attempts, SSO assertions, MFA challenges, session expiration
- Authorization events: Permission changes, role assignments, access grants and revocations
- Data events: Document uploads, data exports, bulk operations, deletion requests
- Tool execution events: Which user executed which tool, with what inputs, producing what outputs, using how many tokens
- Administrative events: Configuration changes, SSO modifications, billing actions, policy updates
Log Format
{
"event_id": "evt_a1b2c3d4e5f6",
"timestamp": "2026-02-10T14:23:17.892Z",
"actor": {
"user_id": "usr_789",
"email": "jane.smith@company.com",
"role": "power_user",
"ip_address": "203.0.113.42",
"user_agent": "Mozilla/5.0..."
},
"action": "tool.execute",
"resource": {
"type": "tool",
"id": "contract-generator",
"name": "Contract Generator"
},
"details": {
"input_tokens": 1240,
"output_tokens": 3800,
"project_id": "prj_456",
"duration_ms": 8200
},
"result": "success",
"data_classification": "confidential"
}
Log Retention and Export
Audit logs are retained for a minimum of 7 years, meeting the longest common regulatory retention requirement. Logs can be exported in real time via:
- SIEM integration: Stream events to Splunk, Datadog, Elastic, or any syslog-compatible SIEM
- S3/GCS export: Automated daily exports to your cloud storage for archival
- API access: Query audit logs programmatically with filtering, pagination, and search
- Dashboard: Visual audit log explorer in the Enterprise Admin panel with advanced filtering
Anomaly Detection
Alfred's audit system includes automated anomaly detection that flags unusual patterns:
- Login attempts from new geographic locations
- Unusual tool usage patterns (a marketing user suddenly accessing database tools)
- Bulk data export requests
- After-hours activity spikes
- Rapid sequential tool executions suggesting automated abuse
Anomalies trigger configurable alerts via email, Slack, webhook, or PagerDuty integration.
Data Residency and Sovereignty
For many enterprises, where data is processed and stored is as important as how it is secured. Regulatory requirements (PIPEDA, GDPR, industry-specific regulations) may mandate that data remain within specific geographic boundaries.
Alfred's Data Residency Options
- Canada (default): All data processed and stored in Canadian data centers. Compliant with PIPEDA and provincial privacy legislation.
- United States: US-based processing and storage for organizations subject to US data residency requirements.
- European Union: EU-based processing for GDPR compliance. Available on Enterprise plans.
- Dedicated infrastructure: Single-tenant deployment on dedicated servers for maximum isolation. Available on Enterprise Plus plans.
Data Isolation
Each organization's data is logically isolated at every layer of the stack:
- Database level: Separate schemas with row-level security policies
- Storage level: Encrypted, organization-specific storage buckets
- Inference level: Organization context is never shared across tenants and is not used to train models
- Network level: VPC peering available for Enterprise Plus customers
Compliance Frameworks
Alfred maintains compliance with the following frameworks:
SOC 2 Type II
Annual SOC 2 Type II audits covering security, availability, processing integrity, confidentiality, and privacy trust service criteria. Audit reports are available to enterprise customers under NDA.
ISO 27001
Information Security Management System (ISMS) certification covering all aspects of Alfred's infrastructure, development, and operations.
PIPEDA
Full compliance with Canada's Personal Information Protection and Electronic Documents Act. This includes consent management, data minimization, purpose limitation, and individual access rights.
HIPAA (Healthcare)
Business Associate Agreement (BAA) available for healthcare organizations. Alfred's HIPAA-compliant configuration includes additional access controls, audit requirements, and data handling procedures specific to Protected Health Information (PHI).
CASL
Canada's Anti-Spam Legislation compliance for all communication features, including consent tracking and unsubscribe management.
Encryption Standards
In Transit
All data in transit is encrypted using TLS 1.3 with Perfect Forward Secrecy. API connections require TLS — plaintext HTTP requests are rejected. Certificate pinning is available for mobile and desktop client applications.
At Rest
All stored data is encrypted using AES-256-GCM with customer-specific encryption keys. Enterprise Plus customers can provide their own encryption keys (BYOK) through AWS KMS or Google Cloud KMS integration, maintaining full control over data encryption and decryption.
In Processing
Sensitive data processed by AI models is handled in encrypted memory enclaves where available. Inference results are not cached beyond the session unless explicitly configured by the organization. Model inputs are never used for training.
Implementation Guide
Deploying Alfred with enterprise security typically follows a four-phase approach:
Phase 1: Identity Integration (Week 1)
- Configure SSO with your identity provider
- Define role mappings from IdP groups to Alfred roles
- Enable MFA requirements
- Set session duration and idle timeout policies
Phase 2: Access Control (Week 2)
- Create custom roles matching your organizational structure
- Assign tool permissions by department and function
- Configure project-level isolation for sensitive workloads
- Set API key scopes for integrations
Phase 3: Monitoring (Week 3)
- Connect audit log streaming to your SIEM
- Configure anomaly detection alert channels
- Set up usage dashboards for security and compliance teams
- Establish incident response procedures for AI-specific scenarios
Phase 4: Compliance Validation (Week 4)
- Review data residency configuration
- Validate encryption settings meet organizational standards
- Conduct access review with security team
- Document AI usage policies and communicate to users
Alfred's Enterprise onboarding team provides dedicated support throughout the implementation process, including architecture reviews, security assessments, and custom configuration assistance.
Enterprise-Grade AI Security
SSO, RBAC, audit logging, data residency, and compliance — all built in, not bolted on. Talk to our enterprise team.
Explore Enterprise Enterprise Pricing
Someone from somewhere
just launched website.com
Just now