The deployment diagram a privacy officer needs. PHI stays inside the customer environment, the compile bridge runs locally, the .kolm artifact ships out without payloads. Same diagram Schedule 1 of the BAA references.
Artifact SHA, K-score, run timestamps, ring HMACs. No prompts, no outputs, no PHI ever. see a receipt
Encrypted at rest with customer KMS key. Bridge process reads, redacts, distills — never phones home with bytes.
The artifact carries LoRA weights + recipes + evals + manifest. No PHI inside. Customer chooses to push to hub or keep private.
| Component | Where it runs | Owns PHI? | Notes |
|---|---|---|---|
| Compile bridge (Docker / Helm) | Customer VPC | Yes — never leaves | One-click deploy from enterprise console |
| PHI redactor (18 identifiers) | Customer VPC | Pre-pass on every compile | Stable placeholders [PATIENT], [DATE-1], [MRN-1] |
| LoRA train + eval | Customer VPC | Uses redacted seeds | K-score gate ≥ 0.95 enforced in PHI mode |
| Customer KMS key | Customer VPC | Encrypts seeds + receipts | AWS KMS · Azure Key Vault · HashiCorp Vault |
| HMAC receipt chain | Customer VPC | Payload-free | 4 rings: compile, eval, run, audit — spec |
| Audit log query | Customer VPC (read) + kolm.ai (write-only) | Pointer + hash only | 30-day retention or customer-controlled |
| .kolm runtime | Any device the customer authorizes | Receives no PHI from kolm.ai | macOS / Linux / Windows / iOS / Android |
Total: under 60 minutes from BAA-signed to first signed compile, on a fresh AWS account, on a Friday afternoon.
| What if… | What happens |
|---|---|
| Bridge tries to phone home with PHI | Egress harness drops the packet, ring-3 records bytes-out > 0, run refuses to sign. |
| Customer KMS key is revoked | Signing fails closed. No artifact written. No run executes against the artifact — gate check requires fresh ring signature. |
| Redactor misses an identifier | Verifier placeholder_consistency fails. K-score below 0.95 in PHI mode. Gate refuses, artifact not produced. |
| Someone swaps the artifact | Manifest SHA in the receipt no longer matches the artifact bytes. kolm inspect exits 5 CHECKSUM_FAIL. |
| Auditor asks for run history | Compliance package export at /v1/account/compliance-package returns 90 days of receipts + chain + control mapping. Same bytes you can re-verify locally. |
10-row Schedule 1: Purpose, Permitted Uses, Safeguards, Breach Notification 10 business days, Subprocessors flow-down, Return/Destruction 30 days, Audit Rights, HIPAA Security Rule Mapping, Survival.
22-row table: each CFR citation (§164.308–§164.316) mapped to the kolm control that satisfies it. Required vs Addressable flagged.
7-row table with PHI-status pills. 30-day notice for change. subprocessors@kolm.ai for objections.