Kory. Security & Governance

Built to be trusted,
not just capable.

Kory is KYRO'S AI Agent — engineered so your data stays yours, your actions stay supervised, and every decision leaves a traceable record. Kory's architecture aligns with the NIST AI Risk Management Framework, NIST SP 800-53, and the NIST Privacy Framework — the standards defining responsible AI adoption across US federal and enterprise environments.

SOC 2 Type II Certified
Independently audited
NIST AI RMF 1.0 Aligned
GOVERN · MANAGE · MEASURE
NIST SP 800-53 Rev. 5 Aligned
AC · IA · AU · SC controls
Kory control layers
01PII tokenization
Privacy
02Delegated identity
Identity
03Runtime RBAC gating
Auth
04Human-in-the-loop
Gov
05Audit trail
Audit
06Managed identity
Infra

Every layer of the stack, secured.

01

PII never reaches the model

Personal identifiers — emails, phone numbers, names — are replaced with reversible tokens before any data enters the LLM. Real values are restored only in the trusted output path.

02

Delegated per-org identity

Each organization gets a dedicated Kory agent identity, auto-provisioned with uniqueness constraints. Cross-org delegation is explicitly blocked.

03

Runtime permission gating

Tool availability is filtered by user RBAC before the planner sees them, then revalidated again at execution. No tool is invoked without permission.

04

Human-in-the-loop approvals

Sensitive actions pause for explicit confirmation. Rejection cancels silently. Session ownership is validated to prevent cross-user takeover.

05

Full on-behalf audit trail

Every mutable action records both agent and human principal. Approval states and timestamps are written to an immutable trace.

06

Managed identity infra

Azure UAMI-based RBAC governs service access. Role naming is deterministic and auditable — no static secrets or shared credentials.

How controls stack in every request.

01
PII redaction

Input scanned; real PII replaced with tokens before processing.

02
Identity check

Agent identity established. User context preserved for attribution.

03
RBAC filter

Tool catalog filtered by user RBAC. Only permitted tools visible.

04
HITL gate

Sensitive tools pause. User confirms before any write occurs.

05
Audit record

Action runs under scoped token. Dual-principal record written.

06
Restoration

Tokens resolved to real values only in the final user response.

Built on the frameworks that define responsible AI.

NIST AI RMF 1.0

AI Risk Management Framework

NIST's AI RMF defines how organizations should govern, map, measure, and manage AI risk. Kory's HITL approval gates and per-org scoping implement the GOVERN and MANAGE functions.

NIST SP 800-53

Security & Privacy Controls

Kory's RBAC gating, managed identity, and audit logs are direct implementations of the AC, IA, AU, and SC control families defined in this federal standard.

NIST Privacy 1.0

Privacy Risk Management

Kory's privacy-by-design model — where PII is tokenized at the input layer — directly enacts the Identify and Protect functions of the NIST Privacy Framework.

EO 14110 + CSF 2.0

Safe AI & Cyber Hygiene

US Executive Order 14110 requires AI oversight. Kory's HITL architecture aligns with these directives, while CSF 2.0 governs credential hygiene.

What we guarantee, not just what we built.

Data is never exposed

PII tokenization is architectural, not a setting. Personal data cannot reach the LLM layer. Aligned with NIST Privacy PR.DS-P.

Mandatory approvals

Kory cannot act without human confirmation. The HITL gate is mandatory and rejection-safe. Aligns with NIST AI RMF GOVERN 6.1.

Full accountability

Dual-principal records carry both agent and user identity. Traceable and auditable. Aligned with NIST SP 800-53 AU-2.

The beliefs that shaped every decision.

Privacy by design

PII isolation is architectural — enforced at graph level, not configurable.

Least privilege

No tool or scope is granted beyond what the action requires.

Human oversight

Sensitive actions require explicit approval — Kory proposes, humans decide.

Defense in depth

Controls stack: permission check at planning and again at execution.

Auditability

Every action traceable to a human principal with a durable record.

Zero standing access

Infrastructure uses managed identity with deterministic RBAC.