Controlled Data Egress Gateway

Data leaves your
environment every day.
Does it have permission?

CloudLock is the egress mirror of CloudGate. Where CloudGate inspects what enters your environment, CloudLock controls what leaves — scanning for sensitive data, enforcing approval policies, and delivering an immutable audit trail for every release.

Get Early Access See How It Works
cloudlock.internal — Egress Control Centre
acme-corp tenant
Requests
⬆ Pending Release4
✓ Released Today
✗ Blocked
◷ History
Configuration
⚖ Policies
🔎 DLP Rules
📬 Destinations
👤 Approvers
Compliance
📋 Audit Log
📄 ReportsNew
① Stage
② DLP Scan
③ Approve
④ Release
Pending Egress Requests
// 4 awaiting action · last updated 14:33:02
📊 customer_churn_analysis_Q3.csv
requestor: [email protected] dest: partner-sftp.external.com size: 2.4MB
✗ 847 PII fields detected (email, NI number) · release blocked
Blocked
🗄 model_performance_report_v4.pdf
requestor: [email protected] dest: auditor-portal.internal size: 890KB
✓ DLP clean · awaiting sign-off from data-governance team
Awaiting Approval
📦 aggregated_stats_nov_2024.parquet
requestor: data-pipeline/ci-job-442 dest: s3://partner-analytics-bucket size: 14.2MB
✓ DLP clean · approved by m.wilson · releasing...
Releasing
📝 infrastructure_diagram_v2.drawio
requestor: [email protected] dest: consultant-sharepoint size: 220KB
⚠ Internal IP ranges detected · redaction required before release
DLP Scanning
100%Of egress inspected before release
ZeroUnaudited data transfers
DLPAI-powered sensitive data detection
Air-gapOne-way controlled release support
The Problem

Your environment is secure.
Your exits aren't.

Organisations spend enormous effort controlling what comes in — firewalls, CloudGate, VPN. Almost nobody has equivalent controls on what leaves. Data exits through a dozen informal channels every day: SFTP uploads, S3 copies, email attachments, CI pipeline artefacts. None of it is inspected, approved, or recorded.

📤

Shadow Data Egress

A data scientist exports a CSV to share with an external partner. A pipeline copies model outputs to an S3 bucket. A developer sends a log file to a consultant. These happen dozens of times a day. Nobody knows if any of those files contained personal data, credentials, or information that shouldn't have left. There is no record they happened at all.

🏛

Compliance Without Evidence

GDPR, HIPAA, PCI-DSS, and ISO 27001 all require you to demonstrate control over where personal data goes. When an auditor asks "show me every transfer of customer data in the last 12 months and who approved each one," the honest answer for most organisations is a spreadsheet that someone assembled after the fact. That is not a compliance posture. It is a liability.

🔓

Insider Threat Blindspot

Perimeter security stops external attackers. It does nothing about the legitimate user who copies a customer database to their personal cloud storage before resigning, or the pipeline that silently leaks training data to an external endpoint. The threat model for regulated data is overwhelmingly internal — and most environments have zero egress visibility to detect it.

How CloudLock Works

Four stages.
Nothing releases unexamined.

Every egress request passes through the same four-stage pipeline regardless of source, destination, or file type. The result is binary: it exits through a verified, logged channel — or it doesn't exit at all.

📋 Egress Release Log
Live
14:33
aggregated_stats_nov_2024.parquet
DLP clean · approved by m.wilson · delivered via S3
→ s3://partner-analytics · SHA256 verified · receipt issued
Released
🚫 BLOCKED — customer_churn_analysis_Q3.csv @ 14:31
DLP engine detected 847 PII fields including email addresses and National Insurance numbers. Automatic block applied — policy: no-pii-to-external-sftp. Requester notified.
→ Detected: EMAIL_ADDRESS (612), NI_NUMBER (235), PHONE_UK (0)
13:58
model_weights_v8_export.tar.gz
DLP clean · approved by [email protected] · 2.1GB
→ secure-drop.partner.io · SFTP · receipt #CL-20241121-0041
Released
13:44
infrastructure_diagram_v1.drawio
Internal IP ranges redacted (14 occurrences) · auto-redacted per policy
→ consultant-portal · redacted copy delivered · original retained
Redacted + Released
12:20
Q3_board_report_FINAL.pdf
DLP clean · no approval required (policy: internal-doc-to-internal-dest)
→ sharepoint.internal · receipt #CL-20241121-0040
Auto-Released
DLP Engine

It doesn't just look for names.
It understands context.

Pattern-matching catches obvious PII. CloudLock's DLP engine goes further — understanding the semantic meaning of data, not just its format. A column called "ref_id" containing NI numbers looks like an identifier until you read the values.

🔎 DLP Analysis — customer_churn_Q3.csv 2.4MB · 12,400 rows
customer_churn_Q3.csv Blocked · 847 findings
customer_idC-00482901
ref_idAB 12 34 56 C← NI number
segmenthigh-value
churn_prob0.847
postcode[REDACTABLE]
Block National Insurance numbers (235 rows). Column ref_id contains UK NI numbers despite non-descriptive column name. Destination is external SFTP — policy blocks NI numbers leaving regulated boundary.
Block Email addresses (612 rows). contact column contains personal email addresses. Classified as personal data under GDPR Article 4. External transfer requires explicit consent record — none found.
Redact UK postcodes (847 rows). postcode column. Redactable — not required for stated analytical purpose. Auto-redaction available if block policy is overridden by approver.
Info 8 additional columns clean. Aggregate statistical columns (churn_prob, segment) contain no PII and could be released independently. Consider requesting a filtered export.
⚖ Policy Engine — acme-corp
no-pii-to-externalActive
IFdestination.type = external
ANDdlp.findings.contains(PII)
THENBLOCK · notify requester
large-export-approvalActive
IFfile.size > 100MB
ANDdestination.type = external
THENREQUIRE approval from data-governance
auto-redact-internal-ipsReview
IFdlp.findings.contains(INTERNAL_IP)
ANDdestination.classification = trusted-partner
THENREDACT · auto-release
internal-to-internalActive
IFdestination.type = internal
ANDdlp.findings = none
THENAUTO-RELEASE · log only
Policy Engine

Rules your compliance
team actually wrote.

CloudLock's policy engine is declarative and human-readable. Your data governance team defines what can leave, where it can go, under what conditions, and who can approve exceptions — without writing code or raising infrastructure tickets.

  • Policies are version-controlled in Git and applied via the same GitOps pipeline as the rest of your Cloudyard configuration.
  • Destination classifications — internal, trusted-partner, external, public — are defined once and referenced across all policies.
  • Approval chains are role-based and rooted in your existing OIDC identity. No separate user management.
  • Policy violations are logged with full context — who tried to send what, where, and which rule fired. Not just a count.
  • Emergency overrides are possible but require two-person authorisation and produce a permanent, un-deletable audit record.
Audit & Compliance

The evidence pack
your auditor actually accepts.

Compliance posture is only as good as the evidence you can produce. CloudLock generates it automatically — not a spreadsheet assembled after the fact, but an immutable, cryptographically signed record of every egress event.

🔏

Immutable Audit Log

Every release, block, and redaction event is written to an append-only log in MinIO with a cryptographic hash chain. Individual records cannot be altered or deleted without detection. The log is the evidence.

📜

Signed Receipts

Every released file comes with a cryptographically signed receipt — file checksum, DLP report summary, approver identity, timestamp, and destination. Recipients can verify the receipt against CloudLock's public key.

📊

Compliance Reports

One-click generation of GDPR Article 30 records of processing, PCI-DSS data transfer logs, and ISO 27001 evidence packs covering any time window. Formatted for auditors, not engineers.

🔔

Anomaly Alerting

Unusual egress patterns — a user transferring 10× their normal data volume, a new external destination appearing, a pipeline exfiltrating data outside business hours — trigger alerts to your security team before they become incidents.

The Boundary Trilogy

Complete control at
every crossing point.

CloudGate controls what enters. CloudLock controls what leaves. Together with Cloudyard managing what runs inside, you have complete, auditable control over every boundary in your regulated environment.

+ +

Ingress, platform, egress — fully integrated

CloudGate inspects every artefact before it enters your cluster. Cloudyard provides the self-service platform where your engineers build and run workloads. CloudLock ensures nothing leaves without DLP inspection, policy enforcement, and an auditable approval record. The three products share your OIDC identity, your MinIO storage, and your Grafana observability stack — no separate deployments, no separate user management, no gaps between them.

Pricing

Open core.
Compliance-grade enterprise.

Basic egress logging and DLP scanning is open source. Subscribe for the full policy engine, compliance reporting, anomaly detection, and SLA-backed support.

// Community
Open Source
£0
forever, no limits
Egress staging, basic DLP scanning, and audit logging for all file types. Community supported.
  • Egress staging & approval UI
  • PII pattern detection
  • Basic audit log (MinIO)
  • Backstage self-service form
  • SFTP / S3 delivery
  • AI contextual DLP analysis
  • Policy engine
  • Compliance reports
  • Anomaly alerting
  • Cryptographic receipts
// Enterprise
CloudLock+
Contact
per deployment / month
Full DLP engine, declarative policy, compliance reporting, and anomaly detection for regulated environments.
  • Everything in Community
  • AI contextual DLP engine
  • Declarative policy engine
  • Auto-redaction
  • Cryptographic receipts
  • Immutable hash-chained log
  • GDPR / ISO 27001 reports
  • Anomaly alerting
  • Emergency override audit
  • SLA integration support
// Bundled
Via Cloudyard
Bundled
with Cloudyard+ subscription
Already on Cloudyard? CloudLock+ is included — pre-wired to your OIDC, MinIO, and Grafana stack.
  • Full CloudLock+ features
  • Auto-wired to Cloudyard
  • Shared OIDC identity
  • DataHub classification sync
  • Unified Grafana dashboards
  • CloudGate + CloudLock pair
  • No separate deployment
Early Access

Nothing leaves
uninspected.

CloudLock is in private development. If you operate in a regulated or air-gapped environment and have a data egress problem, we'd like to talk to you — especially if you're already running Cloudyard or CloudGate.

// Register Interest