Kamba — Symphony
Deployment Architecture
Kamba operates exclusively within Symphony's approved infrastructure perimeter — isolated from Symphony's own internal systems, and isolated from the outside world. Nothing enters. Only user-initiated, allowlisted data queries leave.
Kamba operates exclusively inside Symphony's AWS VPC — the same infrastructure Scotiabank has already reviewed, approved, and deployed. It is isolated in two directions simultaneously: inward, with no lateral access to Symphony's own databases, services, or core infrastructure; and outward, with no access to any system outside Symphony's VPC except user-initiated, explicitly allowlisted data provider endpoints. Kamba cannot reach Scotiabank's internal network, the public internet, or any other environment independently. It accepts zero inbound connections. All egress is user-initiated, governed by Symphony's own network controls, and fully logged.
Symphony's AWS VPC.
WSS:// · outbound
No data persists beyond a single request lifecycle. All scratch files, query data, and intermediate results are wiped automatically. No external volumes or persistent storage attached.
by design, not by configuration.
Outbound: port 443 allowlist only
endpoints only
Symphony core infrastructure
of all network traffic
Contained entirely within Symphony's perimeter.
Kamba Engine opens an outbound WebSocket (WSS) to Symphony Messaging to receive and respond to user queries. This connection stays entirely within Symphony's VPC. No inbound connections are accepted by the container.
The only traffic that leaves Symphony's VPC is outbound HTTPS to data providers explicitly selected and connected by the user. No external endpoint is reachable without user-initiated configuration. Every connection is governed by Symphony's Security Group and Network ACL controls.
Transient storage is scoped to individual request lifecycles. No PII, query data, or results survive beyond a single message. Nothing is written to external storage.
Kamba is isolated from Symphony's own internal systems (no lateral access to Symphony databases, services, or core infrastructure) and from everything outside Symphony's VPC. The container exists in its own sealed subnet with no path in or out except what is explicitly defined and user-initiated.
Access to internal data sources — data lakes, warehouses, portfolio systems, files — is read-only and must be provisioned by a Scotiabank administrator before any user can query it. No user can self-connect to internal infrastructure.
Kamba works with any institutionally approved LLM. The model receives only the user's query — never the underlying data. Data retrieval, validation, and synthesis happen entirely within Kamba's engine. The LLM interprets intent; it never sees or processes client data.
trusted secure messaging infrastructure.
Symphony Communications is purpose-built for regulated financial institutions — banks, asset managers, broker-dealers — where data confidentiality is non-negotiable. Scotiabank has already completed its vendor due diligence and approved Symphony as a vendor. Kamba runs entirely within that approved perimeter, inheriting its security architecture by design.
