Shared Responsibility Model

Version 1.0

Last revised on: January 20, 2026

Shared Responsibility Model

This document describes the allocation of security and compliance responsibilities between Prediction Lab, LLC ("Prediction Lab," "we," "us," or "our") and you ("Customer") across our deployment options.

Security and compliance are a shared responsibility. Understanding the allocation ensures your data is properly protected and you meet your compliance obligations.

Overview

DeploymentPrediction Lab ManagesCustomer Manages
Multi-Tenant CloudInfrastructure, application, security, operationsCustomer Data content, user access
Single-Tenant CloudInfrastructure, application, security, operationsCustomer Data content, user access, region selection
BYOCApplication software, updates, app monitoringInfrastructure, network, base OS, encryption keys
Desktop (Local Mode)Application softwareAll other aspects

Legend

PL = Prediction Lab responsible | Customer = Customer responsible | Shared = Both parties | N/A = Not applicable

1. Infrastructure & Network Security

ResponsibilityMulti-TenantSingle-TenantBYOCDesktop (Local)
Physical data center securityPL (via AWS)PL (via AWS)Customer (via AWS)Customer
Compute provisioningPLPLCustomerCustomer
OS patching (base infrastructure)PLPLCustomerCustomer
OS patching (application containers)PLPLPL (via Nuon)N/A
Network configurationPLPLCustomerN/A
Firewall / Security groupsPLPLCustomerCustomer
DDoS protectionPLPLCustomerN/A
SSL/TLS certificatesPLPLCustomerN/A

2. Application Security

ResponsibilityMulti-TenantSingle-TenantBYOCDesktop (Local)
Application code securityPLPLPLPL
Application updatesPLPLPL*Customer**
Vulnerability scanningPLPLSharedN/A
Penetration testingPLPLSharedN/A
API securityPLPLPLN/A

*BYOC: We push updates; you control update windows and can grant/revoke permissions.

**Desktop: We provide updates; you install them.

3. Identity & Access Management

ResponsibilityMulti-TenantSingle-TenantBYOCDesktop (Local)
Authentication infrastructurePLPLSharedCustomer
SSO/SAML integrationSharedSharedSharedN/A
User provisioningCustomerCustomerCustomerCustomer
Role and permission managementCustomerCustomerCustomerCustomer
MFAPL provides; Customer enablesPL provides; Customer enablesPL provides; Customer enablesN/A
API key managementCustomerCustomerCustomerN/A
Admin account securityCustomerCustomerCustomerCustomer

4. Data Security

ResponsibilityMulti-TenantSingle-TenantBYOCDesktop (Local)
Encryption at restPLPLCustomerCustomer
Encryption in transitPLPLSharedN/A
Key managementPL (AWS KMS)PL (AWS KMS)CustomerCustomer
Data classificationCustomerCustomerCustomerCustomer
BackupPLPLCustomerCustomer
Data retention policiesPL provides; Customer configuresPL provides; Customer configuresCustomerCustomer
Data deletion on terminationPLPLCustomerCustomer
Data exportPL provides tools; Customer executesPL provides tools; Customer executesCustomerCustomer

5. Compliance & Governance

ResponsibilityMulti-TenantSingle-TenantBYOCDesktop (Local)
Processor obligations (GDPR)PLPLSharedN/A
Controller obligations (GDPR)CustomerCustomerCustomerCustomer
CCPA complianceSharedSharedSharedCustomer
SOC 2 certificationPLPLCustomer (their environment)N/A
Security policiesPL (our operations)PL (our operations)CustomerCustomer
Employee background checksPL (our staff)PL (our staff)CustomerCustomer
Audit logging (infrastructure)PLPLCustomerN/A
Audit logging (application)PLPLPLN/A
Log retentionPLPLCustomerCustomer

6. Monitoring & Incident Response

ResponsibilityMulti-TenantSingle-TenantBYOCDesktop (Local)
Infrastructure monitoringPLPLShared*N/A
Application monitoringPLPLSharedN/A
Security monitoringPLPLShared*N/A
Incident detectionPLPLSharedCustomer
Incident responsePLPLSharedCustomer
Breach notification (authorities)SharedSharedSharedCustomer
Breach notification (data subjects)CustomerCustomerCustomerCustomer
Status pagePLPLCustomerN/A

*BYOC Monitoring: PL monitors application health and configuration drift via control plane; Customer monitors underlying cloud infrastructure.

7. Business Continuity

ResponsibilityMulti-TenantSingle-TenantBYOCDesktop (Local)
High availabilityPLPLCustomerN/A
DR planningPLPLCustomerCustomer
Service restorationPLPLCustomerN/A
RTO/RPO commitmentsPL (per SLA)PL (per SLA)CustomerN/A
Geographic redundancyPLPLCustomerN/A

Deployment Options

Multi-Tenant Cloud

We manage: All infrastructure, application deployment and updates, monitoring and alerting, backup and DR, security infrastructure (WAF, DDoS, encryption).

You manage: User accounts and permissions, Customer Data content and quality, compliance with laws applicable to your data use, enabling security features (MFA, SSO), API key security.

Data Location: US (AWS us-east-1)

Single-Tenant Cloud

We manage: Same as Multi-Tenant, on dedicated infrastructure in your selected region.

You manage: Same as Multi-Tenant, plus region selection for data residency requirements.

Data Location: Your selected AWS region

BYOC (Bring Your Own Cloud)

We manage: Application software and code, application-level security, pushing updates automatically, application container patching, application health monitoring, configuration drift detection, documentation, support for our software.

You manage: AWS account and infrastructure, compute/storage/database provisioning, network security, base infrastructure OS patching, encryption keys, backup and DR, underlying infrastructure monitoring, HA architecture, compliance certifications, costs, update timing/windows.

Data Location: Your AWS account, your regions. Your data never leaves your cloud environment—only our control plane communicates with the runner in your account.

Our Access: A runner is deployed in your account to manage operations without requiring direct vendor access or cross-account permissions after initial install. You have full control over permissions at three levels: Cloud Controls (grant/revoke runner permissions), Network Controls (enable/disable external management), and Cluster Controls (application-level permissions). All access is logged.

Desktop Application (Local Mode)

We manage: Application software, providing updates (you install them).

You manage: Device security, data storage and backup, device access control, network security, local data encryption, compliance, incident response.

Data Location: Your device only

Security Features by Deployment

FeatureMulti-TenantSingle-TenantBYOCDesktop
SSO (SAML/OIDC)AvailableAvailableAvailableN/A
MFAAvailableAvailableAvailableN/A
IP AllowlistingEnterpriseAvailableCustomer configuresN/A
Audit LogsAvailableAvailableAvailableLimited
Data ExportAvailableAvailableCustomer managesAvailable
Custom RetentionStandard onlyConfigurableCustomer managesN/A
Encryption at RestAES-256AES-256Customer configuresCustomer manages
SOC 2 ReportAvailableAvailableN/AN/A

Compliance Certifications

CertificationMulti-TenantSingle-TenantBYOCDesktop
SOC 2 Type ICertifiedCertifiedCustomer responsibilityN/A
SOC 2 Type IIIn ObservationIn ObservationCustomer responsibilityN/A
CCPACompliantCompliantSharedCustomer

Contact

Support: support@predictionlab.ai

Enterprise customers may contact their customer success manager for deployment-specific guidance.