NIC Trust Center

Nuvint Intelligence Core is a multi-tenant AI operating layer for lenders and risk teams that turns fragmented loan documents, servicing data, and workflow events into searchable evidence, governed automation, citation-backed answers, and examiner-ready operating controls.

This public page combines the product summary buyers need with the security, architecture, identity, and operational-control posture required for diligence.

Last updated: 2026-04-19 | Source: runtime_configuration

0 Software Overview

What NIC does

Unifies loan files, memos, conversations, and decision artifacts into a tenant-scoped system of record for retrieval, review, and operational AI workflows.

Who it is for

Banks, credit unions, private lenders, servicers, and risk operators that need faster due diligence, cleaner exception management, governed automation, and defensible AI-assisted decision support.

Why it matters

NIC reduces manual file review, preserves evidence trails, and keeps automation bounded by role-based access, tenant isolation, enterprise auth controls, and audit visibility.

1 Security Overview

2 Compliance Roadmap

SOC 2 Type I

in_progress.

SOC 2 Type II

planned.

ISO 27001

future.

3 Architecture Overview

4 Operational Assurance

5 Data Handling

6 Access Control

7 Incident Response Summary

Detection

Operational alerts, connector failures, and audit anomaly signals.

Response

Containment, investigation, remediation, access review, and tenant impact review.

Notification

Customer communication based on severity and contractual obligations.

8 Vendor Risk FAQ

Do you support enterprise SSO?

Enterprise OIDC and SAML SSO are supported, with tenant-scoped role mapping and manual-role preservation controls.

Status: configured
Do you support SCIM provisioning?

Tenant-scoped SCIM user and group provisioning is supported for enterprise onboarding and lifecycle management.

Status: yes
Do you have audit logs?

Tenant-scoped audit logs capture access, ingestion, governance, workflow, and auth-operations actions.

Status: yes
Do you support data residency?

Deployment region is configured as 'us-east-1'.

Status: yes
Do you encrypt data at rest?

Data at rest uses platform-managed encryption controls.

Status: yes

9 Evidence Links

10 Attestation

This profile is configuration-derived and does not itself certify external compliance.

11 Vendor Questionnaire Accelerators

SIG Lite Pre-Answers

SIG-LITE-001: How do you isolate customer data?

Tenant-scoped isolation is enforced across retrieval, storage, and audit boundaries.

Status: ready
SIG-LITE-002: Do you provide audit logging and evidentiary exports?

Yes. Tenant-scoped audit trails and export packs are available for compliance workflows.

Status: ready
SIG-LITE-003: What are your encryption controls?

Encryption is enabled in transit and at rest with environment-configured key management.

Status: ready

CAIQ Mapping

AIS-01 -> SIG-LITE-001

Application & Interface Security

Status: mapped
LOG-01 -> SIG-LITE-002

Logging & Monitoring

Status: mapped
EKM-03 -> SIG-LITE-003

Encryption & Key Management

Status: mapped

Data Flow Summary

Nodes: 5 | Flows: 4
source -> ingest

documents, transcripts, metadata

ingest -> store

parsed text, chunks, audit metadata

store -> reason

tenant-scoped retrieval context

reason -> ui

answers, citations, exports

Subprocessors

OpenAI

Model Inference

Reasoning and summarization tasks where enabled by tenant policy.Region: Configurable by deployment | Status: active