Cutover takes data privacy and security seriously, implementing multiple layers of protection for all customer data processed by our AI systems.
Our security approach
Secure infrastructure
Our AI processing service runs within a secure AWS environment, separate from our core services to ensure proper isolation.
Data encryption
All data is encrypted in transit using TLS with AWS KMS envelope encryption, protecting customer information at all times.
Zero data retention
No customer data is stored when using the AI service. We process data ephemerally without persistent storage.
Data processing & isolation
How We Process Your Data
AI processing takes place in AWS regions in the US (N. Virginia / Oregon) and the EU (Frankfurt / Zurich).
Customer data remains stored within your environment's database and is never stored outside your Cutover instance.
Data is processed ephemerally by AWS Lambda functions and AWS Bedrock, with strict isolation between invocations.
All model inference occurs within AWS infrastructure and stays within your selected AWS region.
THE PROBLEMS WE SOLVE
AI Foundation Models
Primary Model
We primarily use Anthropic's Claude Sonnet 3.5 v1 model in production environments.
Hosted via AWS Bedrock
Additional Models
For certain use cases, we leverage AWS models such as Titan and Nova, also accessed via AWS Bedrock. Same secure infrastructure
No Model Training with Your Data
We do not fine-tune underlying foundation models with customer data. Instead, we use out-of-the-box models combined with techniques like multiple-shot prompting and RAG (Retrieval Augmented Generation) to achieve excellent results without requiring customer data for training.
THE PROBLEMS WE SOLVE
AWS Security Measures
AWS Bedrock Security
• Data encrypted in transit using TLS with AWS KMS
• No storage or retention of prompts or responses
• Inputs and outputs not used to train AWS or third-party models • All model inference occurs within AWS infrastructure
AWS KMS Encryption
AWS Key Management Service (KMS) uses envelope encryption to efficiently and securely protect data:
• Data is encrypted using a unique data encryption key (DEK)
• The DEK is encrypted with a customer master key (CMK) stored in KMS
• Encrypted DEK is stored alongside the encrypted data • AWS services quickly decrypt the DEK using KMS when needed
Ready to learn more
Contact our team to discuss how Cutover's secure AI capabilities can transform your technology operations.