Skip to main content
This topic uses private connectivity as a general term for AWS PrivateLink and Azure Private Link.
Yes. Each dedicated instance is single-tenant and logically isolated. It is not shared with other customers at the application or network level.
By default, dedicated instances block public ingress and egress. When private connectivity is enabled, traffic between the Customer environment and Unstructured stays on cloud-provider private networking. Public ingress or egress can be enabled on request for specific use cases. For more information, see Network access controls.
Yes. Data is encrypted in the following ways:
  • In transit: All traffic uses TLS 1.2 or higher.
  • Internally: Mutual TLS (mTLS) is used between platform services.
  • In cloud storage: Encryption policies are enforced at the storage layer.
  • At rest: Customer-managed KMS keys are available as an option on request.
Unstructured personnel do not access Customer data as part of normal operations. Access to Customer data sources is explicitly configured, limited to the minimum permissions required, and governed by Customer-controlled IAM, RBAC, and resource policies. Any exceptional access, such as for troubleshooting, is controlled and audited.
No. Customer data processed within a dedicated instance is not used to train models.
  • Customers manage user access to the Unstructured UI and APIs.
  • Network access can be restricted by using private endpoints, security groups, and firewall rules.
  • DNS resolution can be kept private and scoped to Customer networks.
Private connectivity helps protect against:
  • Exposure to the public internet
  • Unintended inbound network access
  • DNS-based traffic interception
Private connectivity does not protect against:
  • Application-layer vulnerabilities
  • Misconfigured IAM or RBAC policies
  • Compromised credentials
Unstructured does not store Customer data long-term. Customer artifacts are used ephemerally during workflow execution and removed upon completion or failure. Transformed data is written to the configured destination. The data that persists in the Unstructured platform is limited to connector and workflow configuration metadata, connector keys stored in a secret store, and workflow execution telemetry, which does not contain file data.
Unstructured maintains industry-standard security and compliance programs, including HIPAA compliance architecture, ITAR readiness with geo-blocking through AWS WAF, and SOC 2 controls. Detailed compliance artifacts are available in the trust portal.