Healthcare Provider EnvironmentBiolytics-Managed External ProcessingGPU Cloud Provider IaaS LayerAudit and Compliance ArtifactsActorsClinical Application LayerProvider ControlsPrivate Network EnclaveApplication Storage and LoggingEU Data Center / Region LockHypervisor / Bare MetalGPU Hardware(H100 / H200 / B200 class)Physical DC Security(provider-controlled)Application Audit Log(metadata trail)Infrastructure Access Log(SSH, console, cloud trail)Deployment Provenance(image tag, model checksum)Key Rotation Log(who, when, approval)Signed DPA / Processor Agreement(audit rights, incident clauses)Provider Evidence(ISO 27001, SOC 2, regional scope)Doctor / UserDPO / AuditorEHR Application ServerAccess Control(service authorization)mTLS Client Auth+ API CredentialSecurity Group / Allowlist(approved client endpoints only)TLS 1.2+terminationvLLM Inference Service(non-root, read-only rootfs)Operational Access Control(least privilege, MFA, SSH keys)Encrypted Volume(customer-managed controls)Model Weights(checksum verified on load)PHI-Safe Audit Log(session IDs, timestamps, metadata only) clinical requestauthorize inference useprepare authenticated callallowlisted trafficdecrypted inference requestencrypted response controlled operations accessephemeral read / writeload model + verify checksum metadata-only audit eventregional placementexecutes workloadphysical security coverageauthenticated request carrying clinical contextencrypted response returned to EHRruns on provider infrastructurewrites operational metadatarecords model checksum at deploy timerecords key rotation eventsprovider access and facility trailregional hosting evidencecertifications and audit reportscovered by processor agreementreview application audit trailreview provider evidencereview contractual basis