Skip to content

BlueUPTrust infrastructure for the AI era

We design and build cybersecurity platforms, regulatory compliance and intelligent agent orchestration. Native Zero Trust. Data sovereignty. AI Governance.

Technology Stack & Partners

Google CloudRustNATS JetStreamOpenZitiKeycloak

🏗️ Architecture

Hybrid Asynchronous Authorization

A model that decouples the governance plane from the execution plane, combining centralized control with ultra-low latency at the edge.

PhaseComponentDescription
DecisionHybrid IdentityKeycloak (humans) + SPIRE SVIDs (workloads). No static API keys.
DecisionOPA Policy EngineReal-time centralized evaluation at every critical control point.
DecisionSovereign LLMvLLM / Ollama — processing never leaves the controlled infrastructure.
ExecutionBiscuit TokensCapability tokens with cryptographic proof of master authorization.
ExecutionAsync AttenuationAgents restrict privileges locally but never escalate them.
ExecutionEdge VerificationLocal public key — zero latency and full offline operability.

🎬 BlueUPALM in Action

BlueUPALM automates the complete regulatory compliance lifecycle — from transactional data ingestion to official supervisor communication — with Zero Trust architecture, AML engine and DORA incident management.

  • ✅ 9 integrated modules — Dashboard, Clients, Alerts, Communications, DORA...
  • ✅ AML engine with fuzzy screening against EU, OFAC and UN lists
  • ✅ 10-state SEPBLAC legal workflow with automatic F19 form generation
  • ✅ DORA incident management with regulatory timers
  • View full presentation | View documentation

🎬 IDColab in Action

IDColab enables automotive workshops to share repair information, inventory and billing with external collaborators (assessors, insurers, suppliers) securely and without exposing their internal systems to the internet.

  • ✅ No VPN, agents or browser plugins
  • ✅ End-to-end mTLS encryption with OpenZiti
  • ✅ Legacy apps unmodified — exposed as-is
  • ✅ Centralized identity with Keycloak OIDC/PKCE

🔧 Tech Stack

LayerTechnologies
FrontendReact, Angular, TypeScript, CSS Modules
BackendRust (Axum), Python (FastAPI), Quarkus + Camel, NATS
SecurityOpenZiti, Keycloak, SPIRE, OPA, Biscuit Tokens
Data & AIVertex AI, MCP SDK, Trino, Qdrant, PostgreSQL
InfrastructureGoogle Cloud, Cloud Run, Docker, Terraform, GitHub Actions, Cilium, gVisor

🏛️ Three Design Pillars

PillarDescription
Identity as PerimeterSecurity doesn't depend on server location, but on the cryptographic identity of humans and machines.
Dynamic PrivilegesAI proposes, but OPA policies and human intervention act as intelligent security brakes.
Minimum Blast RadiusIsolation with Cilium and gVisor sandboxes: a compromise in one agent never translates into a systemic breach.

📬 Contact

Does your organization need Zero Trust infrastructure, AML compliance or want to explore multi-agent orchestration with AI?

Request a personalized demo