Your data never leaves your walls.
Other AI tools send your project data to OpenAI, Anthropic, or Google. Your tasks. Your budgets. Your decisions. Your vendor names.
Kumty’s Data Anonymization Layer ensures zero project data reaches any external AI. Your prompts go out — anonymized and structurally faithful. Your data stays in.
It’s not a setting. It’s the architecture.
Defense in Depth
The 13-Layer Zero Trust Chain
Every request to the platform passes through thirteen independent security layers. No single failure exposes data. To breach the chain, an attacker would have to defeat all thirteen — at the same time.
01Network isolation
No service talks to another without a verified identity.
Network isolation
No service talks to another without a verified identity.
Every internal request between platform services is mutually authenticated and encrypted. A compromised pod can't impersonate another. Lateral movement is blocked at the network layer before it ever reaches an application.
02Session integrity
Sessions are bound to the device and IP that created them.
Session integrity
Sessions are bound to the device and IP that created them.
Stolen session cookies are useless somewhere else. Sessions live in a hardened store with strict cookie flags, IP binding, and idle expiry. A leaked token alone doesn't grant access.
03Device authorization
Unrecognized devices are challenged before sign-in completes.
Device authorization
Unrecognized devices are challenged before sign-in completes.
First-time devices go through additional verification. Admins can review and revoke any registered device in one click. A password leak isn't enough — the attacker also needs your hardware.
04Identity verification
Every request carries a tamper-proof identity claim.
Identity verification
Every request carries a tamper-proof identity claim.
Tokens are short-lived, signed, and verified at the edge before any request reaches application code. Forgery is mathematically infeasible — and tokens that should have expired actually do.
05Content security
Browsers are told exactly what they may load and run.
Content security
Browsers are told exactly what they may load and run.
A strict content security policy blocks injected scripts, untrusted images, and unauthorized iframes. Even if an attacker found an XSS vector, the browser refuses to execute it.
06Upload guard
Files are inspected before they ever touch storage.
Upload guard
Files are inspected before they ever touch storage.
MIME types are validated against actual file contents — not just the filename. Oversized payloads, executable disguises, and known-bad signatures are rejected at the boundary.
07Input sanitization
Every user input is type-checked and screened for injection.
Input sanitization
Every user input is type-checked and screened for injection.
API inputs are validated against strict schemas. Free-text fields pass through prompt-injection screening before reaching any AI surface. Garbage in is rejected before it can become garbage out.
08Rate limiting
Bursts and brute-force attempts are throttled per actor.
Rate limiting
Bursts and brute-force attempts are throttled per actor.
Limits apply per user, per action, per tier — independently. A misbehaving script can't drown out a legitimate user, and a credential-stuffing attempt can't outpace lockout.
09Audit & risk scoring
Every meaningful action is logged with a risk score.
Audit & risk scoring
Every meaningful action is logged with a risk score.
Sensitive actions are recorded with actor, target, and a computed risk score. Anomalies surface in real time. An attacker leaves a trail — and the system notices the trail.
10Prompt injection protection
User text is classified before it ever reaches a model.
Prompt injection protection
User text is classified before it ever reaches a model.
Inputs that try to override AI instructions are flagged and blocked. The model only ever sees content the platform trusts, so jailbreaks never get the chance to fire.
11Tenant isolation
Three independent layers all enforce the same rule.
Tenant isolation
Three independent layers all enforce the same rule.
Every database query, every middleware check, and every audit record verifies tenancy. To breach another tenant, an attacker would need to defeat three independent layers simultaneously — a defense-in-depth approach with zero shared state.
12Permission check
Role and permission are verified on every API route.
Permission check
Role and permission are verified on every API route.
There is no "trusted internal endpoint." Every route checks the caller's permission against the action they're attempting. A valid token for one role can't act as another.
13Feature visibility
Users only see what they're allowed to use.
Feature visibility
Users only see what they're allowed to use.
Modules and features are gated per role and per user. UI elements don't render, API routes don't respond, and search results don't include things the caller has no business seeing.
Compliance Roadmap
Where we are. Where we’re going.
We’d rather be honest about our certification posture than oversell it. Here’s the truth — and what’s coming next.
GDPR
ShippedRight to access, right to erasure, data portability, consent management, and breach notification — all built into the platform.
Available now
SOC 2 Type II
In ProgressControls implemented and operating. Independent audit window in progress with a Big-4 affiliated assessor.
Audit window active
ISO 27001
In ProgressInformation Security Management System established. Stage 1 readiness review scheduled.
Stage 1 prep
HIPAA
PlannedTechnical safeguards in place. Business Associate Agreement program and risk assessment activate when our first healthcare customer signs.
On request
Architecture Principles
Three rules we never break.
PostgreSQL is the only source of truth
Every cache, every event, every search index is reconstructable from one authoritative store. There is no shadow database to drift, leak, or be forgotten.
Zero project data to external AI
Anonymization happens before any external model sees a token. Mappings are ephemeral. The LLM never learns a real name, vendor, budget, or date. Ever.
Tenant isolation in three independent layers
Database, middleware, and audit each enforce the same rule. To leak data across tenants, an attacker would have to defeat all three at once.
Doing diligence on Kumty?
We’ll send the SIG questionnaire, the architecture white paper, and a live walkthrough of how the Data Anonymization Layer works — under NDA. No marketing fluff.
Responsible disclosure: report vulnerabilities to security@kumty.com. We acknowledge within one business day.