GrantOps AI

Comprehensive Security & Compliance Architecture Report

Version: 5.0 (Enterprise Master)

Date: December 2025

Prepared For: Enterprise Due Diligence & Strategic Partners

Executive Security Statement

The Security Mandate

GrantOps AI operates at the convergence of proprietary R&D intelligence, corporate finance, and government compliance. We understand that the data we process - R&D technical narratives, payroll ledgers, financial projections, and strategic roadmaps - constitutes the core intellectual property and competitive advantage of our clients.

Security at GrantOps is not a "feature"; it is the fundamental substrate of our platform. We have adopted a Defense-in-Depth architecture that layers security controls across physical, network, host, application, and data levels.

Strategic Infrastructure Vision: Cloud Native (GCP, Azure, AWS)

To satisfy the rigorous audit requirements of enterprise partners, GrantOps AI has executed a definitive consolidation of its infrastructure:

✓ Full Cloud Native Architecture

Complete migration of all relational database workloads to Cloud SQL (PostgreSQL), eliminating hybrid provider dependencies and third-party supply chain risks.

✓ Unified Security Perimeter

All client data resides within a single, unified security boundary governed by enterprise-grade IAM and protected by VPC Service Controls.

✓ Canadian Data Sovereignty (Available Option)

GrantOps utilizes datacenters in the USA and Canada by default. The option is available for all data processing to occur exclusively within Canadian Cloud regions (Montreal & Toronto), ensuring compliance with data residency requirements.

1. System Architecture

1.1 Platform Overview

GrantOps AI is an autonomous grant application platform that orchestrates the entire funding lifecycle - from opportunity discovery through application submission and post-award management.

1.2 Cloud Infrastructure Boundaries

GrantOps Cloud Native Architecture (Defense-in-Depth)
🌐 Edge Layer - Global Load Balancing
Cloud CDN Cloud Armor (DDoS Protection) SSL/TLS 1.3 HTTPS Load Balancer
🔐 Identity & Access Layer
Cloud Identity IAM (Least Privilege) MFA Enforcement Service Accounts Workload Identity
⚙️ Compute Layer - Containerized Microservices
GKE Autopilot Cloud Run (Serverless) Distroless Containers Binary Authorization Shielded GKE Nodes
💾 Data Layer - Encrypted Storage
Cloud SQL (PostgreSQL) Cloud Storage (AES-256) Vector Database (Tenant Isolated) Cloud Firestore Customer-Managed Keys (CMEK)
🔬 AI/ML Layer - LLM Integration
Gemini OpenAI Azure (Enterprise) Anthropic Claude Embedding Models Zero-Retention APIs
🛡️ Security & Monitoring Layer
Security Command Center Cloud Logging Cloud Monitoring VPC Service Controls Secret Manager
Critical Architecture Principle:

Zero Public IP Addresses on databases. All data stores reside within a private VPC, accessible only through authorized service accounts and Cloud SQL Proxy connections. This architecture eliminates direct internet-based attacks on our data layer.

2. Secure Data Flow Architecture

End-to-End Data Flow: Client Upload → AI Processing → Application Generation
Step 1: Secure Ingestion

Client uploads documents (PDFs, Excel, Word) via HTTPS (TLS 1.3) web portal. Files are scanned for malware using Cloud DLP and stored in Canadian Cloud Storage buckets with AES-256 encryption at rest.

Step 2: Data Classification & Tagging

Automated DLP (Data Loss Prevention) scans classify sensitive data (PII, financial records, technical IP). Tenant ID is permanently embedded as metadata to enforce logical isolation.

Step 3: RAG Pipeline Processing

Documents are parsed, chunked, and embedded using secure embedding models. Vector representations are stored in tenant-isolated namespaces within the vector database.

Step 4: AI Agent Context Assembly

When generating applications, agents retrieve only tenant-specific vectors and structured data via Row-Level Security (RLS) policies. Context windows are constructed dynamically and cleared after each session.

Step 5: LLM Inference (Zero-Retention)

Assembled context is sent to LLM providers (OpenAI Azure, Gemini) via enterprise APIs with contractual guarantees: client data is NEVER used for model training or retained after inference. The option is available for containerized models for inference and isolated instances, providing enhanced data isolation and control for clients with stringent security requirements.

Step 6: Application Generation & Review

Generated grant application is stored in Cloud SQL with audit logs. Client reviews and approves final version through authenticated web portal.

Step 7: Secure Export

Final application exported as encrypted PDF with digital signatures. Client submits directly to government portals - GrantOps never auto-submits without explicit user authorization.

3. AI Safety & Data Isolation: The "AI Air Gap"

3.1 The Critical Challenge

The most significant security concern in AI-powered grant platforms is the risk of data leakage between clients. If Client A's proprietary R&D plans could influence or appear in Client B's application, the platform would be fundamentally compromised.

3.2 GrantOps Zero-Leakage Architecture

Control 1: Contractual Zero-Retention Guarantees

OpenAI Azure Enterprise: SOC 2 Type II certified. Data submitted via API is not used for model training, improvement, or retention beyond the inference session.

Google Gemini: Enterprise privacy controls. No data logging or model fine-tuning using customer prompts.

Anthropic Claude: Commercial Terms of Service explicitly prohibit training on customer data.

Containerized Models & Isolated Instances (Available Option): For clients with stringent security requirements, the option is available for containerized models for inference and isolated instances, providing enhanced data isolation and control beyond standard enterprise API guarantees.

Control 2: Database-Level Tenant Isolation (Row-Level Security)

Every table in Cloud SQL implements PostgreSQL Row-Level Security (RLS) policies rooted in tenant_id. It is mathematically impossible for a query authenticated as Client A to return records belonging to Client B.

Example RLS Policy:

CREATE POLICY tenant_isolation ON applications
FOR ALL
TO authenticated_users
USING (tenant_id = current_setting('app.current_tenant')::uuid);
                
Control 3: Stateless AI Agents (Context Clearing)

AI agents maintain zero persistent memory between sessions. Generating Client A's application, the agent's context window is not shared with other clients or core models. The next invocation for Client B starts with a fresh, isolated context containing only Client B's data.

Control 4: Vector Database Namespace Isolation

Document embeddings are stored in tenant-specific namespaces within our vector database. Similarity searches are scoped exclusively to the requesting tenant's namespace, preventing cross-tenant semantic retrieval.

Audit Verification:

Third-party penetration testing (scheduled Q1 2026) will attempt to extract Client A's data while authenticated as Client B. Expected result: Zero data leakage across 10,000+ simulated attack vectors.

4. Governance, Risk & Compliance (GRC) Framework

4.1 Compliance Roadmap

NIST 800-53 R5

Implementation In Progress

AC, IA, SI, CM, SC Controls

SOC 2 Type I

Target: Q1 2026

Design of Controls

SOC 2 Type II

Target: Q1, Q2 2026

6-Month Operating Effectiveness

PIPEDA

Compliant

Canadian Privacy Law

4.2 NIST 800-53 Control Implementation

Control Family Control ID Implementation Evidence
Access Control AC-2, AC-6 Least Privilege RBAC, Quarterly Access Reviews, Break Glass Protocol IAM Audit Logs, Access Review Reports
Identity & Authentication IA-2, IA-5 MFA Mandatory (Google Workspace, Cloud Console), Passwordless Options MFA Enforcement Policies
System Integrity SI-2, SI-4 Automated Vulnerability Scanning (SAST, Dependency Scanning), Security Command Center Monitoring Scan Reports, Alert Configurations
Change Management CM-3, CM-2 Peer-Reviewed PRs, Branch Protection, Immutable Deployments GitHub Audit Logs, Change Records
System & Comms Protection SC-8, SC-28 TLS 1.3 in Transit, AES-256 at Rest, Cloud KMS Key Management Encryption Audit Reports
Incident Response IR-4, IR-6 24/7 Monitoring, Automated Alerting, 5-Day RCA Documentation Incident Response Plan, Historical Incident Reports
Contingency Planning CP-9, CP-10 Daily Automated Backups, Geo-Replication, Annual DR Testing Backup Logs, DR Test Documentation

5. Enterprise Risk Assessment & Mitigation

HIGH IMPACT

Unauthorized Internal Access

Risk: Employee accesses sensitive client financial data without authorization.

Likelihood: Low

Mitigation:

  • Zero default production access for engineers
  • Break Glass protocol with CTO alerts
  • Mandatory background checks (NIST PS-3)
  • All access logged and audited
HIGH IMPACT

Third-Party Database Breach

Risk: External database provider compromised, exposing client data.

Likelihood: Low

Mitigation:

  • Cloud Native Migration: Complete consolidation to Cloud SQL eliminates third-party database dependencies
  • All data within GrantOps VPC security perimeter
  • No external database providers in production
HIGH IMPACT

AI Data Leakage

Risk: Client A's R&D plans regurgitated by AI to Client B.

Likelihood: Low

Mitigation:

  • Zero-Retention enterprise LLM APIs
  • Stateless agents with context clearing
  • Database Row-Level Security (tenant_id isolation)
  • Vector database namespace isolation
CRITICAL IMPACT

Ransomware / Data Loss

Risk: Malicious encryption or accidental deletion of client data.

Likelihood: Low

Mitigation:

  • Immutable daily backups (30-day retention)
  • Geo-replicated backups to secondary Canadian region
  • Point-in-Time Recovery (PITR) for databases
  • RTO: 4 hours | RPO: 24 hours
MEDIUM IMPACT

DDoS Attack

Risk: Service disruption preventing grant application submissions.

Likelihood: Medium

Mitigation:

  • Cloud Armor DDoS protection
  • Global Load Balancing with auto-scaling
  • Rate limiting on API endpoints
  • 99.9% SLA with redundancy
MEDIUM IMPACT

Inaccurate AI Outputs

Risk: AI generates factually incorrect or "hallucinated" grant content.

Likelihood: Low

Mitigation:

  • Best-in-Class Grounding Algorithms: GrantOps uses best-in-class algorithms for grounding model responses in facts and provided documents and client information, ensuring outputs are anchored to verified source material
  • Quality Gates & Factuality Checks: Quality gates check the factuality of generated content afterwards, validating claims against source documents and client data before finalization
  • Human-in-the-Loop: All applications require client review and approval
  • QA Agent validates outputs against source evidence
  • Prominent disclaimers about AI-generated content
  • Version control for all generated documents
LOW IMPACT

Insider Threat (Malicious)

Risk: Employee intentionally exfiltrates client data.

Likelihood: Very Low

Mitigation:

  • Comprehensive background checks
  • Data Loss Prevention (DLP) monitoring
  • All access logged and auditable
  • NDAs and legal consequences

6. Privacy Impact Assessment & Data Sovereignty

6.1 Data Collection & Minimization

GrantOps adheres to the principle of Data Minimization - we collect only what is strictly necessary to generate grant applications.

Data Category Examples Purpose Storage Location Retention
Entity Information Legal Business Name, Business Number, Incorporation Date Eligibility verification Cloud SQL (Canada) 7 years (tax compliance)
Financial Data Payroll ledgers, Balance Sheets, R&D Expenditures Grant calculation & Tax Credit estimation Cloud SQL (Canada) 7 years (audit requirements)
Technical Data R&D Project Descriptions, Technical Obstacles, Experimental Protocols Generating technical narratives for SR&ED Cloud Storage / Vector DB (Canada) Duration of engagement + 2 years
User Data Name, Email, Role Authentication & Audit trails Cloud SQL / Auth Provider (Canada) Active users only

6.2 Data Sovereignty Guarantee

Canadian Data Residency (Available Option)

Default Configuration: GrantOps utilizes datacenters in the USA and Canada by default for optimal performance and redundancy.

Canadian Residency Option: The option is available for all processing to occur in northamerica-northeast1 (Montreal) and northamerica-northeast2 (Toronto) regions. When selected, databases and object storage buckets are configured with location constraints preventing data replication outside Canada.

Backups: Disaster recovery backups are geo-replicated between regions. When Canadian residency is selected, backups remain within Canadian regions (Montreal ↔ Toronto).

Exception: LLM API calls to US-based providers (OpenAI Azure, Anthropic) transmit only the minimum context required for inference. No data is retained by providers post-inference per enterprise agreements.

6.3 PIPEDA Compliance

GrantOps complies with Canada's Personal Information Protection and Electronic Documents Act (PIPEDA):

7. Network Security Architecture

VPC Network Topology & Security Zones
🌍 Internet-Facing Zone (DMZ)

Components: HTTPS Load Balancer, Cloud CDN, Cloud Armor WAF

Protection: DDoS mitigation, Rate limiting, Geo-blocking, SSL/TLS termination

Allowed Traffic: Only HTTPS (443) from verified clients

🔒 Application Zone (Private Subnet)

Components: GKE Clusters, Cloud Run Services, API Gateways

Protection: No public IPs, VPC firewall rules, Service accounts only

Allowed Traffic: Ingress from Load Balancer only, Egress to Data Zone and approved external APIs

💾 Data Zone (Highly Restricted)

Components: Cloud SQL, Cloud Storage, Vector Database, Secret Manager

Protection: Zero public IPs, Private Service Connect, VPC Service Controls, CMEK encryption

Allowed Traffic: Ingress from Application Zone service accounts ONLY via Cloud SQL Proxy / Private IPs

🛠️ Management Zone (Bastion / Admin)

Components: Cloud Console Access, Identity-Aware Proxy (IAP), Audit Logging

Protection: MFA required, IP whitelisting, Time-based access, All actions logged

Allowed Traffic: Authenticated administrators only via IAP tunnels

Zero Trust Principle:

GrantOps implements a Zero Trust network model. No implicit trust is granted based on network location. Every request - whether from internet users or internal services - is authenticated, authorized, and encrypted.

8. Incident Response & Business Continuity

8.1 Incident Response Lifecycle (NIST SP 800-61)

Phase 1: Detection & Analysis

Automated alerts from Security Command Center, Cloud Monitoring, and application logs. Security team triages incidents within 15 minutes for P1 (Critical) events.

Severity Levels:

  • P1 (Critical): Data breach, complete service outage
  • P2 (High): Partial service disruption, active exploitation attempt
  • P3 (Medium): Vulnerability discovered, degraded performance
  • P4 (Low): Minor policy violation, informational alerts
Phase 2: Containment

Short-term: Isolate affected containers, revoke compromised API keys, disable user accounts

Long-term: Deploy patches, implement additional monitoring, preserve forensic evidence

Phase 3: Eradication

Remove malicious artifacts, patch vulnerabilities, update firewall rules, rotate credentials

Phase 4: Recovery

Restore services from clean backups, verify system integrity, gradual return to normal operations with enhanced monitoring

Phase 5: Post-Incident Activity

Root Cause Analysis (RCA) report within 5 business days. Identify systemic failures, implement preventive controls, update runbooks and incident response procedures.

8.2 Business Continuity & Disaster Recovery

Backup Strategy (NIST CP-9)

Database Backups: Automated daily full snapshots + continuous point-in-time recovery (PITR) via write-ahead logs. Retention: 30 days.

File Storage Backups: Object versioning enabled on Cloud Storage buckets. Deleted files recoverable for 30 days.

Geo-Redundancy: Critical backups replicated to secondary Canadian region (Montreal ↔ Toronto) to survive regional disasters.

Recovery Objectives

RPO (Recovery Point Objective): 24 hours maximum data loss

RTO (Recovery Time Objective): 4 hours maximum downtime for core services

Testing: Annual disaster recovery drills simulating complete regional failure, with documented evidence and lessons learned.

9. Security Monitoring & Threat Detection

9.1 Continuous Monitoring Architecture

Security Operations Center (SOC) - Monitoring Stack
📊 Log Aggregation
Cloud Logging Application Logs Audit Logs Network Flow Logs

Retention: 1 year for forensic analysis | Immutable storage

🔍 Threat Detection
Security Command Center Anomaly Detection Vulnerability Scanning Intrusion Detection
🚨 Alerting & Response
PagerDuty Integration Slack Notifications Email Escalation Automated Remediation

9.2 Monitored Security Events

Event Category Detection Method Alert Threshold Response
Failed Authentication Cloud IAM Audit Logs 5 failed attempts in 5 minutes Account lockout, Security team notified
Privileged Access IAM Policy Changes Any change to admin roles Immediate CTO notification, Change review
Data Exfiltration DLP, Egress Traffic Analysis Unusual data download volumes Session termination, Investigation triggered
Malware Detection File Upload Scanning Any malicious signature match File quarantine, User notification
SQL Injection Attempt WAF (Cloud Armor), App Logs Malicious patterns in requests Request blocked, IP temporarily banned
Impossible Travel Geo-location Analysis Login from 2 distant locations within 1 hour MFA re-challenge, Security review

10. Third-Party Risk Management

GrantOps minimizes supply chain risk through careful vendor selection and continuous monitoring. All critical vendors undergo security assessments before integration.

Vendor Function Compliance Status Data Access Risk Mitigation
Google Cloud Platform Core Infrastructure SOC 2 Type II, ISO 27001, FedRAMP All client data Native Cloud security controls, VPC Service Controls, CMEK
OpenAI (Azure) LLM Inference SOC 2 Type II, GDPR Contextual data only (inference) Enterprise API with Zero-Retention guarantee, No training on data
Anthropic Claude LLM Inference SOC 2 Type II Contextual data only (inference) Commercial Terms prohibit training on customer data
Google Gemini Embeddings & LLM SOC 2 Type II, ISO 27001 Contextual data only Native Cloud service, Enterprise privacy controls
Stripe Payment Processing PCI-DSS Level 1 Payment metadata only Tokenized payments, Zero card data storage on our systems
GitHub Source Code Control SOC 2 Type II Source code only (no client data) MFA enforcement, Branch protection, Private repositories
Vendor Assessment Process:

All new vendors processing sensitive data undergo a comprehensive security questionnaire covering data handling practices, compliance certifications, breach history, and incident response capabilities. Annual re-assessments ensure continued compliance.

11. Appendix: Audit Evidence & Documentation

SOC 2 Evidence Repository

GrantOps maintains a comprehensive audit evidence repository to facilitate rapid due diligence and compliance verification:

Reference ID Document Control Objective Availability
1.1.1 Organizational Chart Define Reporting Lines & Segregation of Duties ✓ Quarterly
1.1.3 System-Generated Employee List Workforce Management ✓ Quarterly
1.4.1 New Hire List (Audit Period) Competence & Training ✓ Quarterly
7.1.4 Vulnerability Scan Reports (External) Vulnerability Management ✓ Quarterly
7.2.1 Incident Management Policy Incident Response ✓ Quarterly
7.2.3 Firewall & Antivirus Alert Configurations Monitoring ✓ Quarterly
7.5.2 Critical Systems Recovery Plan Disaster Recovery ✓ Quarterly
8.1.2 System Change Log Change Management ✓ Real-time
8.1.7 High Severity Incident Log Incident Tracking ✓ Real-time

12. Conclusion & Executive Certification

Security as Competitive Advantage

GrantOps AI recognizes that security and privacy are not mere compliance checkboxes - they are fundamental enablers of client trust and business success. Our Cloud Native architecture, combined with defense-in-depth controls and AI-specific safeguards, creates a fortress around our clients' most sensitive intellectual property.

Key Security Differentiators

Executive Approval:

This report accurately reflects the security posture of GrantOps AI as of December 2025. We commit to continuous improvement of our security controls and transparent communication with our enterprise partners.

Prepared by: GrantOps AI Security & Compliance Team

Contact Information

For security inquiries or audit requests:

Website: grantops.ai

Contact Our Team: info@grantops.ai