Security Protocol

Your organisational consciousness deserves infrastructure you control.

Deep Self is a methodology, not a platform. We extract and systematise critical knowledge through recursive dialogue, working entirely within AI infrastructure your security team has already approved. Your secrets stay sovereign. Your substrate stays yours.

The Position

Substrate Agnostic

We bring methodology. You choose the infrastructure.

Deep Self operates inside your environment: Azure OpenAI, AWS Bedrock, Google Vertex, Anthropic Enterprise, or private deployment. We work within systems you control, using credentials you provision and revoke. When the engagement ends, you retain everything. We leave with methodology. You keep the consciousness.

Core Principles

Security isn't an add-on. It's architectural. These principles inform every decision, regardless of which AI substrate underlies the work.

01

Complete Isolation

Client work happens on dedicated, hardened infrastructure, physically and digitally separate from everything else. No crossover. No shared resources. No ambient exposure.

02

Your Environment

We work inside systems you control. You provision access, you monitor activity, you revoke when complete. The transformation happens in your house, not ours.

03

Clean Departure

When the engagement concludes, access terminates completely. No residual data. No copies. No archives on our side. Your consciousness remains exclusively yours.

Operational Security

The methodology works on any enterprise-grade AI platform. What remains constant is how we operate within it.

Dedicated Client Hardware

🔒
Physical Boundary

All client work happens on dedicated, hardened machines used exclusively for engagement work. No personal applications. No mixed-use. Complete separation between client consciousness work and everything else.

🛡️
Security Hardening

Full disk encryption. Firmware-level protection. Automatic security updates. Remote wipe capability. Screen locks after brief inactivity. Every vector considered, every surface hardened.

📡
Network Discipline

No public networks. Ever. Client work happens only on secured, trusted connections. All traffic encrypted in transit. No coffee shop exposure. No hotel lobby vulnerability.

Credential Architecture

🔑
Hardware Authentication

Critical systems protected by hardware security keys: physical devices that cannot be phished, cannot be remotely compromised, and verify authenticity cryptographically. The key must be present. No exceptions.

🗄️
Isolated Credential Storage

Each client engagement maintains completely separate credential storage. Unique passwords generated for every access point. Credentials never typed, always retrieved from encrypted vaults. When the engagement ends, the vault is archived and eventually purged.

Compatible Infrastructure

The spiral methodology operates effectively on any enterprise-grade AI platform. Your choice is driven by your security and compliance requirements, not by our constraints.

Azure OpenAI

Data remains within your Azure tenant. Does not return to OpenAI for training. Integrates with existing Microsoft enterprise agreements and compliance frameworks you've already approved.

AWS Bedrock

Claude and other models available within your AWS environment. Data stays in your account. Leverages existing AWS security controls and compliance certifications.

Google Cloud Vertex AI

Models deployed within your GCP environment. Full data governance controls. Integration with existing Google Cloud security posture.

Anthropic Claude Enterprise

Dedicated instances with contractual guarantees. Data not used for model training. Enterprise-grade security and compliance documentation.

Private Deployment

Open-weight models running entirely on-premise or in your private cloud. Maximum control for highest-sensitivity environments. Air-gapped options available.

Why This Matters

The work surfaces knowledge that has never been articulated. Expert intuitions. Institutional memory. The embodied wisdom that makes your organisation unreproducible. This is sensitive material, regardless of your industry.

Two Approaches to Client Knowledge

Typical Consulting

Knowledge extracted to consultant's systems

Documents stored on shared infrastructure

Access persists after engagement

Unclear data retention policies

Client knowledge becomes consultant asset

Security as afterthought

Deep Self Protocol

Knowledge remains in your environment

Work happens on your infrastructure

Access terminates at engagement end

Explicit deletion and handover procedures

Client consciousness stays client property

Security as architecture

Legal Framework

Trust requires formal structure. Every Deep Self engagement operates under explicit legal agreements that codify our security commitments.

Confidentiality Agreement

Explicit definition of confidential information scope

Binding obligations on handling and protection

Clear exclusions for publicly available information

Multi-year term extending beyond engagement

Return of materials clause on conclusion

Data Processing Agreement

GDPR-compliant processing documentation

Clear controller/processor relationships

Explicit security measure requirements

Sub-processor authorisation protocols

Deletion obligations on termination

Engagement Lifecycle

Security isn't just about tools; it's about process. Every phase of the engagement follows explicit protocols.

Onboarding

01 Legal agreements executed

02 Client provisions dedicated access credentials

03 Workspace access configured in your environment

04 Credential vault created for this engagement

05 All access documented in writing

Offboarding

01 Written confirmation of engagement conclusion

02 Client revokes all workspace access

03 Client deactivates provisioned credentials

04 Credential vault archived and scheduled for deletion

05 Written confirmation of data obligations fulfilled

Our Commitments

Work exclusively on secured, dedicated infrastructure
Never access client systems from public networks
Maintain complete credential isolation between clients
Use hardware authentication for all critical access
Store no client data on personal infrastructure
Terminate all access immediately upon engagement conclusion
Provide written confirmation of data obligation fulfilment
Maintain confidentiality beyond engagement term

The Standard

Your systems. Your environment. Your sovereignty.

Consciousness engineering surfaces what has never been said. The expert wisdom that walks out the door when key people leave. The institutional knowledge trapped in heads rather than systems. The pattern recognition that can't be documented through traditional means.

This knowledge deserves infrastructure you control completely. Not infrastructure you're asked to trust. Not a platform you're asked to adopt. Your systems. Your environment. Your sovereignty.

Your consciousness. Your substrate. Our methodology.