Leasey
Security & Trust

Security posture worth signing off on.

How we protect client data and build AI systems that meet enterprise security, privacy, and compliance requirements.

Four pillars we build on.

Every engagement inherits these by default. When your security team reviews what we've built, these are the controls they find in place.

Private by default

AI workloads run inside your VPC with private model endpoints (AWS Bedrock, Azure OpenAI, GCP Vertex). No model data traverses the public internet unless you explicitly opt in.

Customer-managed keys

KMS, Key Vault, and Cloud KMS integrations with rotation policies. Vendor API keys (OpenAI, Anthropic) stored in secret managers, not environment variables.

Infrastructure as code

Everything ships through Terraform, CDK, Bicep, or Pulumi. Reproducible, reviewable, auditable — the same discipline we apply to any other production system.

Audit trails end to end

Every AI request traced: input, retrieved context, model, tokens, output, cost, and user. Logs flow into your existing SIEM or observability stack.

Compliance posture.

We're a consulting firm, not a certified platform — we build the posture, your compliance team owns the attestation. Here's what that looks like in practice.

HIPAA-aligned deployments

Private model endpoints with BAAs (where the provider offers one), encryption at rest and in transit, access controls, and audit logging. We deploy into your covered entity or business associate environment.

SOC 2 scaffolding

We build with SOC 2 controls in mind from day one — access reviews, change management, logging, incident response patterns. We don't sign attestations on your behalf; we give your compliance team a posture worth signing off on.

GDPR & data residency

Region-scoped model endpoints, controls for subject access, deletion, and export. Data Processing Addenda available on request as part of engagement contracts.

PII & sensitive data

We build PII detection and redaction into retrieval and generation pipelines. Evals measure PII leakage on output. Sensitive-topic handling configurable per vertical (health, legal, finance).

Engagement practices.

How we operate when working inside your systems.

  • Least-privilege access on all client systems, granted per-engagement and revoked at close
  • Scoped, short-lived credentials — never shared secrets, never personal accounts
  • Code and configs reviewed through pull requests; no direct-to-production changes
  • Dependency scanning and vulnerability patching on all code we ship
  • Encryption in transit (TLS 1.2+) and at rest for all data we touch
  • All engagements covered by a mutual NDA before any client data is shared

Responsible disclosure.

Found a security issue in something we've built or on this site? Please email us directly. We'll acknowledge within two business days and work the issue to resolution with you.

Contact
support@codelucent.com
Use subject line [SECURITY] for disclosure reports.

Due diligence requests

Running vendor security review? We'll provide a security overview, a sample engagement security addendum, and references from prior regulated engagements. Ask on a call and we'll send it before the second meeting.

Contact security

Ready to accelerate your tech growth?

Schedule your free consultation today and let's discuss how we can help your business scale efficiently.

Tech growth illustration
Ready when you are

Let’s ship your AI system.

Whether you’re scoping a new LLM product, hardening an existing one, or standing up the infra behind it — we’ll map the shortest path to production.

Email the teamOther ways to reach us