Diverse business team in formal attire discusses strategy in a modern office, reflecting CISO-level collaboration on secure agentic AI adoption.Diverse business team in formal attire discusses strategy in a modern office, reflecting CISO-level collaboration on secure agentic AI adoption.
Blog

Leah Agentic AI Security Architecture: What Your CISO Needs to Know

As a legal leader (whether your title is general counsel, chief legal officer, head of legal, or “top law-talkin’ person”), a significant portion of your role involves demonstrating to security stakeholders that new technology investments meet their enterprise security standards. This is particularly true when evaluating agentic AI for contract management systems that autonomously read sensitive documents and make decisions.

When our team at Leah (formerly ContractPodAI) first began building agentic AI tools for legal, we all had legitimate concerns about allowing autonomous systems to access our most confidential information. After several years of evaluation and implementation experience (as a customer, as a part of the Leah team, and as a user myself) I want to share the security framework that addressed those concerns. 

Traditional SaaS Architecture and Its Limitations

Most SaaS platforms operate on a shared database model: all customer data resides in the same database, separated by customer IDs and access controls. Your CRM records sit alongside other organizations' data. Your project management tasks share tables with other teams.

This architecture works adequately for many use cases. However, for contract data — particularly sensitive legal content — the limitations become apparent:

  • Attorney-client privileged communications
  • Mergers and acquisitions terms under strict confidentiality agreements
  • Pricing information that provides competitive advantage
  • Personal data governed by GDPR, CCPA, and similar regulations
  • Trade secrets fundamental to your market position

A single misconfigured database query could expose this material to competitors. This represents a material risk that security teams (and legal teams) appropriately flag.

 

Multi-Tenant Isolation: The Architectural Solution

Leah, and other modern enterprise platforms address this through true multi-tenant isolation — architectural boundaries that make cross-tenant access impossible by design, rather than relying on permission-based controls alone.

Level 1: Data Partition Architecture

In Leah, and other properly implemented multi-tenant systems:

  • Each customer receives a completely isolated data partition
  • Data is not simply tagged with a customer identifier
  • Data exists in a separate container that other tenants cannot access, by design

That means that when your Legal Operations team searches for non-competes, the system can only access your contracts. This isn't because of filter logic, it's because other companies' contracts don't exist in your data environment. The architecture ensures isolation at the infrastructure level.

Level 2: Dedicated Compute & Resource Isolation

When a Leah agent processes your contract information — extracting renewal dates, analyzing escalation clauses, comparing terms against procurement calendars — all processing occurs in dedicated compute resources assigned exclusively to your tenant.

Your agents operate in isolated compute environments. When processing completes, those environments are sanitized. Other customers' agents never access your compute resources or interact with your data.

This isolation is enforced at the infrastructure level (Azure's container and network isolation), not through application-level access controls.

Level 3: Network-Level Segregation

For organizations in regulated industries (financial services, healthcare) where network isolation carries compliance significance, customer data travels on completely separate network paths. Virtual network isolation operates at the infrastructure level. Even if an attacker compromised network resources, they would encounter isolation boundaries before reaching customer data.

Encryption Standards

In 2026, encryption is expected and standard; the following are “table stakes”:

  • At rest (stored data): AES-256 encryption with separate cryptographic keys per customer. Encryption keys reside in managed key vaults, inaccessible to operations staff and never shared across customers. Key rotation occurs automatically.
  • In transit (data movement): TLS 1.3 for all data transfers without exception.
  • During processing (data analysis): Confidential computing enables contracts to remain encrypted during agent analysis and processing. This addresses regulatory requirements for continuous data protection throughout the entire lifecycle.

Agentic Access Controls & Governance

Some concerns seemed like pure science fiction just a few years ago — like the threat of a rogue agent. In this scenario, an AI agent goes rogue, escalates its own privileges, starts downloading contracts that it shouldn’t be accessing, and a whole host of horrible things happen from that point on.

Permission Model Example – Contract Analysis Agent

Agents operate with defined permission boundaries enforced at the infrastructure level, not just in the application you’re using. An agent cannot escalate its own permissions or operate outside its authorization scope.

Table outlining permitted vs. prohibited actions for Leah’s contract analysis agent, emphasizing AI permission boundaries for secure contract processing.

These boundaries are enforced by the operating system and infrastructure, not by application logic that could potentially be circumvented.

Audit and Logging

Every agent action generates permanent audit records:

  • Which contracts were accessed, including file identifiers, versions, and timestamps
  • What analysis was performed and what data was extracted
  • What decisions were recommended
  • What actions were triggered
  • Which specific agent performed the action

This comprehensive logging enables organizations to:

  • Demonstrate compliance with data protection regulations
  • Reconstruct the complete lifecycle of sensitive data
  • Identify any unauthorized access attempts
  • Support regulatory inquiries and audits

Human Oversight and Control

The "autonomous" scope remains under your control. You determine the boundaries where automation ends and human judgment takes precedence:\

  • High-value liability issues → Require designated approval before escalation
  • Contract redlining suggestions → Require attorney review before external communication
  • Potential compliance violations → Route to Compliance with mandatory human signoff

The agents enhance efficiency; humans retain decision authority where it matters most.

Compliance Framework

Compliance framework chart listing Leah’s certifications: SOC 2 Type II, ISO 27001, GDPR, HIPAA, and FedRAMP (in progress), with security significance.

These certifications provide:

  • Evidence of appropriate vendor due diligence for governance and audit requirements
  • Third-party validation supporting cyber insurance policies
  • Documentation of technical and organizational security measures
  • Foundation for regulatory discussions with compliance teams

Common Security Concerns

1. "What if the vendor experiences a security breach?"

Multi-tenant architecture means an attacker would need to breach your specific tenant's resources. Compromising vendor infrastructure doesn't grant automatic access to customer contracts. Additionally, your encryption keys remain in separate key management systems. Access to encrypted data without cryptographic keys provides no usable information.

2. "What if vendor employees attempt unauthorized access?"

Employee access to encrypted customer data requires multiple approval levels, is time-limited, and generates immutable audit records. Quarterly audits track and review all access. Organizational policies, background investigations, and contractual restrictions provide additional layers.

3. "What if cloud infrastructure experiences issues?"

Modern cloud platforms provide security resources and capabilities that exceed what most individual organizations can implement independently. Multi-tenant isolation ensures your data remains protected even if other cloud customers experience security incidents. Cloud providers manage security at a scale and sophistication level that generally exceeds on-premises alternatives.

4. "Could agents inadvertently share contract terms from other customers?"

No. Agents are tenant-specific and train exclusively on your contracts, your negotiation history, and your preferred terms. Cross-tenant learning would require explicit data sharing agreements, which are not part of standard operations. Each customer maintains their own agent models and training data — no aggregated learning occurs across customers.

Evaluating Other Vendors: Identifying Gaps

When evaluating contract management platforms, certain vendor responses warrant careful review:

Security evaluation table showing key vendor assessment topics—security standards, AI model training, architecture, and compliance—with guiding questions.

Recommended Security Review Process

When evaluating a contract management platform, your security team should conduct:

  1. Architecture Documentation Review: Request technical whitepapers (not marketing materials) explaining multi-tenant isolation, data segregation, and infrastructure design with architectural diagrams.
  2. Security Deep-Dive Session: Schedule a technical discussion with the vendor's security team. Review the security questions outlined in this document.
  3. Compliance Documentation: Review SOC 2 Type II audit reports, recent penetration test results, and industry-specific certifications relevant to your organization.
  4. Practical Security Testing: Upload non-sensitive test contracts and verify:
    • Security isolation holds under test conditions
    • Audit logs capture the access and activity you require
    • Agent permission boundaries function as designed
  5. Contract Requirements Review: Evaluate the provider’s
    • Data Processing Agreement terms
    • Liability provisions in breach scenarios
    • Insurance coverage and requirements
    • Data return and deletion procedures

Risk Assessment

Perfect security is unattainable. Every system carries some level of risk. The relevant question is not "Is this completely secure?" but rather "Is this more secure than our current approach?"

For most organizations, the risk profile changes significantly when moving from email attachments, shared drives, and inconsistent cloud storage—with no audit trail, no encryption, and no access controls—to an enterprise platform with:

  • Architectural multi-tenant isolation
  • Encryption at every stage
  • Comprehensive audit logging
  • Agent permission boundaries
  • Compliance certifications

This represents a material security improvement.

Practical Next Steps

When you're ready to evaluate a platform:

  • Engage your security team early in the process
  • Include them as partners in evaluation, not as obstacles
  • Request technical documentation and audit reports
  • Conduct hands-on security testing in sandbox environments
  • Ask pointed questions about architecture and implementation

A vendor's willingness to provide detailed, transparent answers to security questions tells you a great deal about their confidence in their platform and their commitment to enterprise security standards.

In Summary

Contract security is too important to compromise. Your CISO's concerns are valid. Enterprise-grade security should enable business capabilities safely, not hinder innovation. Thorough security evaluation protects both your organization and your professional reputation.

When comparing risk profiles, consider your current state — contracts distributed across email attachments, shared drives, and various cloud storage solutions with limited audit trails and inconsistent security controls — against a purpose-built platform with enterprise-grade isolation, encryption, audit logging, and compliance certifications. Evaluate vendors thoroughly. Ask difficult questions. Insist on detailed answers and third-party validation. Make security decisions based on architecture and evidence, not marketing claims.

The relevant question is not whether agentic AI introduces risk, but whether it provides stronger security than existing practices.

Your organization's most sensitive agreements deserve that level of rigor.

__________________________________________________________________________________________________________________________________________________________________________________________________________________________

For additional questions or to connect with our security team, please contact:

Jerry Levine
[email protected]
LinkedIn:
https://www.linkedin.com/in/jerrylevine