Security Built Into the Architecture

Security Built Into the Architecture

Security Built Into the Architecture

Nodes deploys inside your VPC. No external API calls. No data egress. No OpenAI in your supply chain.
This is why security reviews take days, not months.

Nodes deploys inside your VPC. No external API calls. No data egress. No OpenAI in your supply chain.
This is why security reviews take days, not months.

Nodes deploys inside your VPC. No external API calls. No data egress. No OpenAI in your supply chain.
This is why security reviews take days, not months.

Why Approvals Are Faster

Why Approvals Are Faster

Why Approvals Are Faster

What Blocks Other AI Vendors — And Why nodes Doesn’t

Blocker

Blocker

Third-Party AI (OpenAI)

Third-Party AI (OpenAI)

Third-Party AI (OpenAI)

Data Egress

Data Egress

Data Egress

Model Opacity

Model Opacity

Model Opacity

Subprocessor Chain

Subprocessor Chain

Subprocessor Chain

Typical Timeline

Typical Timeline

Typical Timeline

Other AI Vendors

Other AI Vendors

Requires full assessment (+3–6 months)

Requires full assessment (+3–6 months)

Requires full assessment (+3–6 months)

Data leaves your environment (+2–4 months)

Data leaves your environment (+2–4 months)

Data leaves your environment (+2–4 months)

Can't inspect black-box models (+1–2 months)

Can't inspect black-box models (+1–2 months)

Can't inspect black-box models (+1–2 months)

Multiple vendors to assess (+1–3 months)

Multiple vendors to assess (+1–3 months)

Multiple vendors to assess (+1–3 months)

6–12 months (often rejected)

6–12 months (often rejected)

6–12 months (often rejected)

No external AI dependencies

No external AI dependencies

No external AI dependencies

Single-tenant only

Single-tenant only

Single-tenant only

Full model access—you own the weights

Full model access—you own the weights

Full model access—you own the weights

No subprocessors for data

No subprocessors for data

No subprocessors for data

2–3 weeks

2–3 weeks

2–3 weeks

Zero Data Leaves Your Environment. Ever.

Zero Data Leaves Your Environment. Ever.

Zero Data Leaves Your Environment. Ever.

All processing—ingestion, scoring, interviews, sourcing—happens inside your VPC or on-prem. No outbound connections to external AI services.

Validated by Independent Auditors

Validated by Independent Auditors

Validated by Independent Auditors

Nodes is designed for regulated industries, strict legal teams, and security-first organizations. Your data stays protected, your models stay yours, and every part of the system is fully auditable.

SOC 2 Type II

Certified

Security, Availability, Confidentiality, Processing Integrity

HIPAA

Compliant

BAA available. Technical & administrative safeguards implemented.

FedRAMP

In Progress

Target: FedRAMP Moderate. Agency-specific ATO available now.

NIST 800-171

Aligned

Architecture supports all 110 controls. For defense contractors.

CMMC

Aligned

Supports Level 2+ requirements.

REGULATORY MAPPING

How NODES Addresses Industry Requirements

How NODES Addresses Industry Requirements

Financial Services (OCC, FDIC, SEC, FINRA)

Model risk management, vendor oversight, data governance, and AI explainability requirements addressed through single-tenant deployment, customer-owned models, and comprehensive audit trails.

Defense & Aerospace (DoD, DCSA)

CMMC alignment, NIST 800-171 controls, supply chain security, and air-gapped deployment options available for classified environments.

Healthcare (HIPAA, HITECH)

PHI protection through PII stripping, BAA available, encryption requirements met, and audit logging for compliance validation.

DATA PROTECTION

PII Stripped Before Any AI Processing

PII Stripped Before Any AI Processing

PII Stripped Before Any AI Processing

Before models see candidate data, protected attributes are automatically removed.

Attributes stripped

Name, email, phone, address, age, graduation year, photos, gender indicators, ethnicity-correlated markers, location

Encryption

Name, email, phone, address, age, graduation year, photos, gender indicators, ethnicity-correlated markers, location

Key ownership

Name, email, phone, address, age, graduation year, photos, gender indicators, ethnicity-correlated markers, location

ACCESS CONTROL

Integrates Identity Infrastructure

Integrates Identity Infrastructure

Integrates Identity Infrastructure

All authentication flows through your identity provider.

RBAC

System Admin, Recruiter, Hiring Manager, Interviewer, Auditor, Data Scientist, Custom Roles

Vendor access

NODES has no standing access to your environment. Support access is customer-initiated, time-limited, and fully logged.

SSO

Okta, Azure AD, OneLogin, Ping Identity, Google Workspace (SAML 2.0, OIDC)

BIAS & FAIRNESS

Fairness Built Into Every Layer

Fairness Built Into Every Layer

Fairness Built Into Every Layer

We've been through enterprise security reviews at Fortune 500 banks, insurers, healthcare systems, and defense contractors. Your documentation is ready.

Available under NDA

SOC 2 Type II Report, Penetration Test Results, Architecture Security Review

Available on request

Security Questionnaire (SIG, CAIQ, custom), HIPAA documentation, NIST 800-171 mapping, Model Risk package, Bias testing methodology

DOCUMENTATION

Procurement-Ready From Day One

Procurement-Ready From Day One

We’ve already passed enterprise security reviews at Fortune 500 banks, insurers, healthcare systems, and defense contractors. Documentation is ready when Legal asks.

Available Under NDA

SOC 2 Type II report, penetration test results, and architecture security review—prepared for enterprise legal and security teams.

Security Questionnaires Ready

Standard and custom questionnaires supported, including SIG, CAIQ, and customer-specific security reviews.

Regulatory & Risk Coverage

HIPAA documentation, NIST 800-171 mappings, and model risk packets available on request to accelerate approvals.

See what we're building, Nodes is reimagining enterprise hiring. We’d love to talk.

See what we're building, Nodes is reimagining enterprise hiring. We’d love to talk.

See what we're building, Nodes is reimagining enterprise hiring. We’d love to talk.

See what we're building, Nodes is reimagining enterprise hiring. We’d love to talk.

See what we're building, Nodes is reimagining enterprise hiring. We’d love to talk.