Governed Knowledge Infrastructure for Regulated Operations

Evidence-backed answers. Fail-closed refusal. On your hardware.

Designed for regulated operations where the wrong answer creates liability.

See it live: demo.getkeystone.ai -- 57 Alberta OHS documents, cited answers, fail-closed refusal.

Safety-critical knowledge is scattered, unfindable, and unauditable

Hundreds of SOPs live across SharePoint folders, shared drives, and filing cabinets. When a regulator asks which version of a confined space entry procedure was in effect on the day of an incident, finding the right document takes hours. When an internal audit asks who accessed a specific safety procedure last Tuesday, the honest answer is often: we don't know.

Generic AI tools make this worse. They answer with confidence whether or not the evidence supports it, send your operational documents to third-party cloud providers, and produce no audit trail of what was accessed or by whom.

Keystone is built for organizations where that answer is no longer acceptable.

Governed retrieval infrastructure. Not a chatbot.

Keystone is not an AI assistant. It is governed retrieval infrastructure: the system that makes your safety procedures, audit evidence, and operational knowledge findable, citable, and auditable. Five properties, enforced simultaneously.

Evidence-backed answers with citations to source documents
Every answer cites the specific document and section it draws from. Operators see the source material alongside the synthesized response. No black box. No unsupported assertions.
Refuses to answer when evidence is insufficient
When retrieved evidence does not support an answer, the system refuses rather than generating an unsupported response. This is an architectural constraint enforced outside the language model, not a prompt instruction.
Access control enforced at the retrieval layer, not the UI
User roles are checked before retrieval runs. Unauthorized documents are excluded at the database level and never enter the query context. Role-restricted content cannot be surfaced by reformulating a query.
Tamper-evident audit logging
Every query writes an audit record: user identity, role at query time, documents retrieved, permission decision, and the answer generated. Records are hash-chained with an INSERT-only database role. The application cannot modify or delete them after the fact.
Runs entirely on your hardware. Air-gap capable.
No external API calls for core operation. No data sent to cloud providers. Deployable on customer infrastructure without internet access. Your documents do not leave your network.

Your documents. Your hardware. Cited answers and a full audit trail.

01
Load your documents
SOPs, regulations, and safety procedures are ingested and indexed on your hardware. Documents are assigned access control metadata specifying which roles are permitted to retrieve each one. Nothing leaves your network at any stage.
02
Ask in plain language
Users query the corpus the way they would ask a colleague. No Boolean syntax, no folder navigation, no knowledge of where documents are stored.
03
Access is filtered at query time
Before retrieval runs, the system checks the user's role. Documents the user is not permitted to access are excluded at the database level. This happens at every query, not once at login.
04
Get cited answers with an audit trail
Every response includes citations to specific source documents and sections. Every query generates a tamper-evident log record. If the evidence is insufficient to answer, the system says so rather than guessing.

Safety-critical industries with documentation and audit requirements

Keystone is built for midsize operators in regulated industries where documentation gaps create regulatory exposure, and where incident investigation requires a reliable, provable evidence trail.

Industries
  • Oil and gas operators
  • Industrial contractors
  • Refineries
  • Petrochemical plants
  • Pipeline operators
  • Industrial services
Roles
  • EHS Managers
  • Process Safety Managers
  • Compliance Officers
  • Operations Leaders
  • HSE Coordinators

Start with an SOP Readiness Diagnostic

SOP Readiness Diagnostic
Assess your documentation readiness before committing to a deployment

A fixed-fee engagement that assesses your organization's safety documentation readiness and identifies where governed retrieval would have the most impact. The deliverable is a structured report covering documentation gaps, retrieval risk areas, access control requirements, and a recommended approach for your specific operational context.

Start with a Diagnostic

Built from operational and infrastructure experience

Arnaldo Sepulveda built Keystone AI after 12 years delivering and supporting enterprise platforms at Genesys for defense, healthcare, and financial services customers. Those environments required uptime, security controls, and the ability to prove what happened, when, and who authorized it.

That operational background is why Keystone is built the way it is. Every design decision maps to a documented requirement. Every capability claim maps to a demonstrated proof artifact. No overclaims, no roadmap presented as current capability.

Based in Canada. Serving North American regulated operations.

Active pilot deployment in a regulated operational environment