Cortex+Forge was designed from day one for enterprises that cannot compromise on security. Your data never leaves your cloud. Every agent action is logged, isolated, and auditable.
Each pillar is independently enforced — a failure in one does not cascade to the others.
Your entire Cortex+Forge platform runs inside your GCP or AWS account. We issue licenses and ship updates — that's it. We never have access to your VPC, your KB content, your secrets, or your agent transcripts.
Every agent beam runs in its own Firecracker microVM — a separate kernel, separate memory, separate network stack. Breaking out of one VM gives you nothing but an empty sandbox.
Agents never receive API keys. Each beam gets a short-lived X.509 certificate signed by your tenant's embedded CA, scoped to one user, one task, one hour. Revoke the CA → all agents are immediately invalidated.
Every state change in Cortex+Forge is appended to a hash-chained audit log. Past events cannot be modified or deleted — any tampering is detectable. Built for SOC 2, SOX, and eDiscovery requirements.
GET /api/v1/audit with signed pagination tokensAgent network access is completely blocked by default. You maintain an explicit allow-list of integrations each team can use. Every outbound request is logged, including DNS lookups.
/forge/policyAll data at rest is encrypted with keys you control. Cortex never holds your encryption keys. Choose your own KMS and rotate on your schedule.
Defense in depth with multiple network boundaries between every component.
Internet
│ HTTPS/TLS 1.3
▼
┌─────────────────────────────────────────────────────────────┐
│ Cloud Run (cortex.aicloud.so) │
│ ┌─────────────────────────────────────────────────────┐ │
│ │ Rate limiting (Redis) • Session validation │ │
│ │ RBAC enforcement • Sensitivity tag checks │ │
│ └─────────────────────────────────────────────────────┘ │
└──────────────────┬──────────────────────────────────────────┘
│ HMAC-SHA256 signed (X-Forge-Signature)
│ Private VPC peering (no internet)
▼
┌─────────────────────────────────────────────────────────────┐
│ forge-control VPC (10.100.0.0/24) │
│ │
│ forge-control (10.100.0.3) │
│ • Validates HMAC signature │
│ • Checks approval tier │
│ • Issues beam certificate │
│ • Routes to forge-beams │
│ │
│ forge-beams (10.100.0.4) forge-data (10.100.0.2) │
│ • One microVM per beam • PostgreSQL │
│ • No internet egress by default • Artifact store │
│ • Kernel-level network namespace • Keys (encrypted) │
└─────────────────────────────────────────────────────────────┘All external traffic is TLS 1.3. Internal forge-mesh traffic uses mTLS with certificates from the same CA that issues agent certs.
Cortex signs every request to forge-control with HMAC-SHA256 using a shared secret. forge-control rejects any request with an invalid or replayed signature (5-minute replay window).
Cloud Run connects to Cloud SQL and Memorystore over private VPC peering — no public IPs, no traffic on the internet.
The cloud metadata API (169.254.169.254) is blocked at the VM network namespace level. Agents cannot steal instance credentials.
Architecture-first compliance. Every certification requirement is baked into the platform design, not bolted on.
Independent audit of security, availability, and confidentiality controls. Hash-chained audit log, access controls, and change management are audit-ready today.
Information security management system certification. Enterprise customers can request our current ISMS documentation and control mapping.
PHI stays in your cloud account. Full audit trail of every access event. BAA available for Enterprise tier. No PHI ever touches our infrastructure.
Immutable audit logs, segregation of duties, multi-person approval workflows, and complete change tracking for public company requirements.
Data residency in customer's EU cloud region. No third-party data sharing. Right-to-erasure supported via user deletion API. No cross-border data transfer.
Government-ready architecture. Deploy to FedRAMP-certified GCP and AWS regions. GovCloud support planned for Enterprise customers in 2027.
Specific threats and how each architectural layer mitigates them.
public — visible to all org membersinternal — visible to authenticated org membersrestricted — requires explicit access grantconfidential — requires secret-keeper role + audit logFound a vulnerability? We follow coordinated disclosure. Report to security@cortex.ai — we'll acknowledge within 24 hours and patch within 72 hours for critical issues.
PGP key available on request. We do not pursue legal action against good-faith security researchers.
Enterprise customers can request: