# Haley A standalone RBAC solution that integrates with a company’s private LLM, data warehouse, and IAM, ensuring fine-grained access control, data masking, and full auditability—crucial for industries handling sensitive data (finance, healthcare, government, eCommerce). ### TLDR; **Problem**: LLMs handle unstructured, high-risk production data. Current solutions lack robust role-based access, risking data leaks and compliance penalties. **Solution**: Haley enforces fine-grained RBAC + data masking on LLM queries. Seamlessly integrated with IAM solutions, ensuring only authorized data is returned. **Benefits**: 1. Accelerated Adoption: Safely deploy LLMs org-wide 2. Reduced Costs: Reuse existing IAM and data infra 3. Compliance-Ready: Automatic audits, masking, and redaction ## Problem Statement :::info Enterprise LLM adoption is hindered when LLMs can’t determine who should have access to which information, risking data leakage or unauthorized disclosures. ::: #### Exponential Growth of AI in Regulated Sectors - Finance, healthcare, and government are rapidly adopting LLM-based solutions for analytics and decision-making. - These sectors handle highly confidential or regulated data (PII, PHI, M&A, classified documents). #### Existing LLM Solutions Lack Robust Access Controls - Typical out-of-the-box LLM deployments don’t differentiate data access based on user roles. - Risks include data leaks, inadvertent disclosures, and non-compliance with HIPAA, FINRA, GDPR, etc. #### Complex Regulatory & Compliance Landscape - Enterprises face major penalties and reputational harm for information leakage. - Traditional data governance tools fail to integrate properly with the unstructured queries LLMs handle. ## Solution :::info Haley is a Role-Based Access Control (RBAC) layer for LLMs, enabling fine-grained access control and data masking so users see only data they’re authorized for—accelerating company-wide LLM adoption while maintaining compliance. ::: - Integrates with existing solutions like Active Directory to map users’ roles, groups, or clearance levels. - Enforces fine-grained access policies, ensuring only authorized users can view sensitive fields or documents. ### Key Features - Data Masking & Redaction: Automatically sanitizes sensitive data (PII, deal terms) based on each user’s role. - Auditing & Compliance: Logs every request, including user identity, query details, and redacted vs. unredacted data. - Governance: Prevents non-work-related queries and controls unnecessary usage costs. - Flexible Deployment: Connects seamlessly to on-prem LLMs and vector databases, with no sensitive data leaving the environment. ### Use Cases #### Finance: Investment Banking - Senior Bankers see full M&A details; junior analysts see only summaries or anonymized parties. - Automatic logs facilitate SEC/FINRA compliance #### Healthcare: Hospitals - Doctors see patient PHI; others only see what’s necessary: -- Data scientists: masked records for analysis -- Administration: basic, non-clinical info -- Patient scheduling: limited profile data - HIPAA compliance ensured via full audit trails and data redaction. #### Government - Different departments see only relevant information for their particular department or case. - Citizen Service Portals: Some data (e.g., personal earnings, SSNs) must remain hidden for unauthorized staff -- Case workers: Access sensitive details for approvals -- Support staff: Sanitized case summaries only ### Benefits - Lower LLM Adoption Risk: Role-based controls let every department—from finance to HR—use LLMs safely, boosting productivity. - Reduced CAPEX/OPEX: Integrates with existing identity providers (e.g., Active Directory) and vector databases, avoiding costly new infrastructure. - Low Operational Overhead: Just assign or update roles in AD to manage access—no system rebuilds needed. - Scalable Enterprise-Wide Governance: Centralized policies unify governance rules, simplifying audits and compliance. ## Go-To-Market :::info Leverage the enterprise AI adoption wave by positioning Haley as a critical compliance tool. Target highly regulated industries where data leaks pose major risks. ::: ### Market Opportunity #### Rapid Growth of Enterprise AI - Enterprise AI is growing at a double-digit CAGR, projected to exceed $50B within a few years. - Finance, healthcare, and government are some of the fastest adopters due to large data volumes and complex regulatory needs. - These organizations are willing to invest significantly to prevent data breaches and reputational damage. #### Untapped Potential for “Safe AI” Solutions - Many AI vendors focus on model performance, not compliance. - Without robust RBAC, organizations risk leaks, non-compliance, and fines. - Haley fills the gap by combining productivity gains with data protection. #### Adoption Tipping Point - Regulations are tightening, data leaks are rising, and organizations can’t afford to lag in secure AI deployment. - Haley addresses this by offering compliance-ready, on-prem controls. #### Unfocused Competition: - High-level AI governance tools lack granular, real-time controls for on-prem LLMs. - Model providers prioritize cost and performance over compliance. ### GTM Strategy #### Ideal Customer Profile - Highly Regulated Organizations: Financial institutions, governments, healthcare providers - Strict Compliance Environments: Firms needing data sovereignty and infrastructure control - Enterprises Pursuing Company-Wide AI Adoption: Seeking cost savings via chatbots, knowledge retrieval, etc., with multiple teams needing varied access levels. #### Channel + Ecosystem + Direct Sales - Develop relationships with System Integrators, ISVs and IT consultants as part of their standard LLM implementation package - Technical collaboration with vector database, RAG tooling, and LLM orcherstration software packages to ensure compatability - Direct sales team targeting key accounts ## Strawman Technical Design >A component-based architecture offers both high-security and scalable performance. By including a policy engine, a sandbox vs. direct path decision process, and a final post-processing check, you mitigate data leaks while still providing a responsive user experience. Over time, caching and learned policies will reduce overhead and streamline repeated queries, making the system more adaptive and efficient ### Core Data Flow ![Haley Flow-2025-01-09-100139](https://hackmd.io/_uploads/BJEiRM6Iye.png) #### 1. Haley Gateway Layer Purpose: - Serves as the entry point for all user queries. - Receives the natural language (NL) query from the UI (or CLI, or external API) and handles basic input validation. Key Responsibilities: - Initial Logging: Logs the incoming request (timestamp, user ID, raw query). - Forwarding: Passes the query to the Identity & Policy component. Implementation Considerations: #### 2. Identity & Policy Purpose: - Identity Retrieval: Validate the user’s authentication token/credentials, retrieve roles and permissions (e.g., from Active Directory, Okta, or any IAM). - Policy Engine: Combine user role data with organizational policies to define which data fields or operations are allowed. Key Responsibilities: - User Role & Permissions: Query the enterprise’s IAM/AD. - Policy Lookup: Identify relevant policies for the user’s role, environment, or data classification. - Risk Assessment: LLM-based or heuristic engine here to classify query sensitivity. #### 3. Orchestration Engine Purpose: - Takes the policy outcome (risk score, user role) and decides which path to follow: sandbox or policy-based query rewriting. Key Responsibilities: - Route Decision: -- High-Risk: Send the query to the Sandbox Module. -- Low-Risk: Send the query to the Rewrite Module. - Tracking State: Keeps track of how the query flows through the system. - Caching & Learned Policies: If the query is “seen before” and was safe, it might skip some steps. #### 4a. Sandbox Module (High-Risk Path) Purpose: - Execute the query in a controlled environment to see if it would return sensitive data. Key Responsibilities: - Dry Run or Simulated Execution: -- Possibly an “EXPLAIN” query or a partial fetch to see what columns/tables are accessed. - Sensitive Field Detection: -- If it detects references to disallowed columns, it flags or automatically masks them. - Rewrite or Drop: --- If forbidden columns appear, either remove them from the query or mask them for the real fetch. #### 4b. Rewrite Module (Low-Risk Path) Purpose: - For known safe or low-risk queries, automatically rewrite them by removing or masking forbidden fields. Key Responsibilities: - Policy Enforcement: -- Looks at the user’s role-based restrictions. -- Dynamically modifies the query (e.g., remove columns ssn, credit_card) or apply row-level filters. - Minimal Overhead: -- Bypass the heavier sandbox step, enabling faster response time. #### 5. Data Execution Layer Purpose: - Execute the final, sanitized query against real databases or vector stores, and retrieve results for post-processing. Key Responsibilities: - Connection Pooling & Queries: -- Supports Postgres (SQL), Pinecone (vector search), MongoDB (NoSQL), etc. - Reusability: -- Unified interface to handle different query forms (SQL, vector search, document search). - Masking Hooks: -- Optionally apply final masking if some fields can be easily hidden at the DB level (e.g., database column masking). #### 6. Post-Processing & Check Purpose: - Final pass to ensure no forbidden data slipped through or wasn’t caught by earlier steps. Key Responsibilities: - Pattern Scanning: -- For text fields, run regex or ML-based checks for SSNs, credit cards, etc. - Compliance Enforcement: -- If something is found, mask or remove it before returning the result. #### 7. Return & Audit Logs Purpose: - Deliver sanitized or approved results back to the user. - Record all relevant steps in the audit trail. Key Responsibilities: - User Notification: -- If data was masked or trimmed, inform the user (“Some fields were removed per your access level.”). - Detailed Logging: -- Log which columns/tables were accessed, what was masked, and whether the query was high or low risk. -- Useful for compliance (HIPAA, GDPR, etc.) and debugging. #### 8. (Cross-Cutting) Caching & Learned Policies Purpose: - Improve performance and reduce repeated sandbox overhead by storing knowledge of previously safe queries and user behavior patterns. Key Responsibilities: - Query + Result Cache: -- Store (query signature, user role, final masked result) for quick reuse. - ML/LLM-Driven: -- Over time, the system learns that certain queries from a specific user role are always safe, so it can bypass the sandbox. - TTL & Versioning: -- Invalidate or refresh caches when data changes or policies get updated. ### Strawman Tech Stack **Gateway Layer:** Language: Node.js, Python Flask, or a Golang microservice. Proxy: NGINX, Envoy, or Kong. **Identity & Policy:** IAM: Active Directory, Okta, or custom SSO. Policy Engine: Open Policy Agent (OPA) or custom RBAC logic. **Orchestration Engine:** Language: Python, Java, Go—whatever the team prefers. Might be combined with the Gateway or be standalone microservice. **Sandbox & Rewrite Modules**: Parsing & Rewriting: SQL parsers, LLM-based interpreters for natural language. Sandboxing: Could use a dev/test DB instance or an “EXPLAIN” approach. **Data Execution Layer:** Connectors/Adapters for Postgres, MongoDB, Pinecone, etc. **Post-Processing:** Regex/ML-based PII detection. Potential data classification rules (e.g., labeling columns as “HIPAA,” “PCI,” etc.). **Audit Log:** Storage: Secure database (e.g., PostgreSQL with restricted access) or an append-only store for compliance. ## Strawman Business Plan ### Team Composition Tech Team: - 1 Team Lead (Tech Co-Founder) - 1 AI Engineer - 2 BE Engineer - 1 FE Engineer Business Team: - 1 CEO (Biz Co-Founder) - 1 Marketing & Pre-Sales - 1 Sales ### Revenue Model - Annual subscription based on features and token volume - Licensing + Maintenance for OnPrem customers ### Timeline **Months 0-3:** Team Building - Hiring - Lead-Gen Campaign for PoCs and Pilots - MVP development **Months 3-6:** MVP & POcs - Hiring - MVP supporting a set of SQL, NoSQL, AD, and LLM - First PoC / Pilot **Months 6-9:** PMF Validation - Hiring & Firing - First PoC / Pilot accepted by customer - 3 to 5 Pilots underway - Support for more databases, access rules, roles, data types, etc... **Months 9-12:** Commercialization - First commercial contract signed - Hiring & Firing - Scaling planning (Tech, Marketing, Sales, etc...) ## FAQ **Q: Why Haley?** **A:** Unlike HAL 9000, which was not a helpful AI and did not respect RBAC, Haley is helpful by ensuring RBAC is enforced in all human generative AI interactions.