TelsonBase

Zero-Trust AI Agent Security Platform

Self-hosted. Sovereign. Auditable. Your data never leaves your infrastructure.

Designed by Jeff Phillips | Quietfire | Bellevue, Ohio

v6.3.0CC
Scroll

Why It Matters

The Problem

AI Without Boundaries

AI tools are powerful, but they send your sensitive data -- client financials, attorney-client communications, medical records -- to third-party clouds. Regulated industries cannot afford that risk. One misconfigured API call can trigger a breach notification cascade.

The Solution

Everything Stays Local

TelsonBase keeps everything on your infrastructure. Every agent action is logged to a tamper-evident chain. Every data access is controlled by RBAC and capability enforcement. Every encryption key is yours. Zero third-party data dependencies.

Who It Serves

Regulated Industries

Real estate brokerages handling client financial data. Law firms protecting attorney-client privilege. Healthcare organizations managing PHI. Any organization where data sovereignty, auditability, and regulatory compliance are non-negotiable.

Security Architecture

Five isolated Docker networks. No service has more access than it needs. Internal networks have no external routing.

Frontend Public-facing
Traefik Reverse proxy + TLS termination
Open-WebUI localhost-bound
n8n localhost-bound
TLS 1.2+ / Let's Encrypt / HTTPS Redirect
Backend Application tier
FastAPI TelsonBase Core API
Celery Worker Async task processing
Celery Beat Scheduled tasks
RBAC / Rate Limiting / Security Headers / CORS
Data Internal only
Redis Encrypted data store + AOF
Mosquitto MQTT Authenticated agent messaging
AES-256-GCM / Tenant Namespacing / Password Auth
AI Internal only
Ollama Local LLM inference
MCP Server Capability-enforced bridge
No External API Calls / Egress Firewall / Agent Sandboxing
Monitoring Internal only
Prometheus Metrics collection
Grafana Observability dashboards
localhost-bound / No External Exposure / Anomaly Detection

By the Numbers

0
Lines of production code
0
Passing tests
0
Dedicated security tests
0
Lines of test code
0
Granular permissions
0
Isolated Docker networks
0
HIPAA Safe Harbor identifiers covered
0
Third-party data dependencies

Compliance Coverage

Pre-mapped controls and evidence collection infrastructure for the frameworks that matter most in regulated industries.

SOC 2 Type II

10 Trust Service Criteria controls mapped with automated evidence collection and compliance scoring.

Framework Implemented

HIPAA Security Rule

Full mapping across Administrative, Physical, Technical, and Organizational safeguards (45 CFR Part 164).

Infrastructure Ready

HITECH Act

Breach notification workflows with 60-day deadline tracking, encryption safe harbor, and HHS reporting.

Infrastructure Ready

HITRUST CSF

12 domains tracked with 17 baseline controls pre-mapped, risk assessment scoring, and gap analysis.

Infrastructure Ready

ABA Model Rules

Rules 1.6 (confidentiality), 1.7/1.10 (conflicts), 5.3 (AI supervision), and Formal Opinion 512.

Implemented

Fair Housing Act

Tenant isolation prevents cross-client data leakage. Data classification and complete audit trail.

Implemented

RESPA

Transaction data isolation via client-matter model. 3-5 year retention support with access audit trail.

Implemented

CCPA

Right-to-deletion workflow with approval gates, data retention policies, and breach notification.

Implemented

NAR Data Security Policy

Encryption, MFA, audit logging, data sovereignty, and access controls per NAR requirements.

Implemented

FRCP Rule 37(e)

Legal hold system with deletion override, custodian tracking, and tamper-evident audit chain.

Implemented

Technology Stack

Py

Python / FastAPI

API layer

Rd

Redis

Encrypted data store

Ol

Ollama

Local AI inference

Tk

Traefik

Reverse proxy + TLS

Cl

Celery

Async task processing

Mq

Mosquitto MQTT

Agent messaging

Pm

Prometheus + Grafana

Monitoring + observability

Dk

Docker Compose

Orchestration

Architecture Differentiators