Integrations · Deployment patterns · Exports

Fits your stack.

CEYO is designed to attach at the inference boundary and emit audit artifacts to systems you already operate. Integration does not require modifying model weights or rewriting the inference service.

Integration patterns Deployment modes

Integration patterns

Common attachment points and export surfaces.

Attach
Gateway / proxy

Intercept inference requests at the boundary. Fail-open supported.

mode: "gateway" fail_open: true policy: "POL-001@V1"
Attach
Sidecar

Co-located process beside the inference service in containers.

mode: "sidecar" network: "localhost" latency_budget_ms: 5
Export
Secure storage

Artifacts stored in access-controlled, tamper-evident repositories.

store: "operator_defined" immutability: "WORM|append-only" access: "RBAC"
Export
SIEM / SOAR

Forward integrity events and verification outcomes.

event: "SEAL_FAIL|VERIFY_FAIL" sink: "SIEM" severity: "policy_defined"
Export
GRC evidence

Expose artifacts as evidence objects under explicit scope.

evidence_object: "artifact" controls: ["integrity","provenance","scope"] tier: "controlled_review"
Export
Verifier harness

Independent verification: PASS / FAIL / POLICY_MISMATCH.

canonicalize() recompute_hash() validate_signature() check_policy_alignment()

Deployment modes

Operational postures commonly requested in institutional environments.

Cloud · On-prem · Hybrid
  • Deploy beside inference endpoints without changing core pipelines.
  • Operate with operator-controlled key custody (HSM/KMS/TEE).
  • Store artifacts in operator repositories under existing access control.
Air-gapped / restricted
  • Artifact generation and verification can be isolated to constrained networks.
  • Disclosure tiers define what leaves the enclave, if anything.
  • Fail-open posture remains an operator decision under policy.
Platform components Compliance mapping