Security & Compliance
Protect your data and meet regulatory requirements with enterprise-grade security features and compliance controls.
Overview
Security is foundational to our platform. We provide comprehensive security controls that protect your data, authenticate users, and ensure compliance with industry regulations.
This section covers:
Authentication & Authorization - Secure access control and identity management
SSO Integration - Single sign-on with your identity provider
Data Privacy - How we protect and handle your sensitive information
Compliance - Regulatory standards and certifications
Security Best Practices - Guidance for secure deployment and operation
Core Security Principles
1. Defense in Depth
Multiple layers of security controls protect your data:
Network security and encryption
Application-level access controls
Data encryption at rest and in transit
Regular security audits and monitoring
2. Least Privilege Access
Users and services operate with minimal necessary permissions:
Role-based access control (RBAC)
Fine-grained permissions
Regular access reviews
Automatic permission expiration options
3. Data Sovereignty
Control where your data resides:
Regional data hosting options
Data residency guarantees
No cross-border data transfers without consent
Customer-controlled encryption keys (Enterprise)
4. Transparency
Clear visibility into security practices:
Open security documentation
Audit logs for all access
Incident notification procedures
Regular security reports
Security Topics
Control who can access your agents and data with robust authentication and authorization mechanisms.
Key Features:
Multi-factor authentication (MFA)
Role-based access control (RBAC)
API key management
Session management and timeout
OAuth 2.0 support
Learn About:
Setting up MFA for your organization
Defining roles and permissions
Managing service accounts
Integrating with identity providers
Enable Single Sign-On (SSO) to streamline authentication and improve security.
Supported Providers:
Okta
Azure AD / Microsoft Entra
Google Workspace
OneLogin
Auth0
SAML 2.0 (generic)
OIDC (generic)
Benefits:
Centralized user management
Enforced authentication policies
Reduced password fatigue
Automatic user provisioning/de-provisioning
Audit trail integration
Understand how we collect, process, store, and protect your data.
Topics Covered:
Data collection and usage
Data retention policies
Right to access and deletion (GDPR)
PII detection and handling
Data encryption standards
Third-party data sharing (or lack thereof)
Key Commitments:
Your data is never used to train models for other customers
No selling or sharing of customer data
Encryption at rest and in transit
Secure data deletion procedures
Meet regulatory requirements with our compliance certifications and controls.
Standards & Certifications:
SOC 2 Type II
GDPR (EU General Data Protection Regulation)
CCPA (California Consumer Privacy Act)
HIPAA (Healthcare - Enterprise tier)
ISO 27001 (Enterprise tier)
Compliance Features:
Data processing agreements (DPA)
Business associate agreements (BAA) for HIPAA
Audit logs and reporting
Data residency controls
Subprocessor management
Practical guidance for deploying and operating the platform securely.
Organization-Level:
Enforce MFA for all users
Regular access reviews
Security training for administrators
Incident response planning
Agent-Level:
Minimize data exposure in prompts
Use appropriate access controls
Implement content filtering
Monitor for anomalous behavior
Integration-Level:
Secure API key storage
Rotate credentials regularly
Validate webhook signatures
Use environment-specific keys
Security Architecture
Data Flow Security
Encryption Standards
In Transit: TLS 1.3 for all connections
At Rest: AES-256 encryption for stored data
Keys: HSM-backed key management (Enterprise)
Backups: Encrypted with separate keys
Network Security
Private network isolation
DDoS protection
Rate limiting and throttling
IP allowlisting (Enterprise)
VPN access options (Enterprise)
Access Control Model
User Roles
Pre-defined roles with appropriate permissions:
Admin: Full organizational control
Manager: Agent and user management
Member: Agent usage and creation
Viewer: Read-only access
Custom Roles: Define your own (Enterprise)
See User Permissions & Roles for details.
Agent-Level Permissions
Control access at the agent level:
Private agents (creator only)
Team agents (specific groups)
Organization-wide agents
Public agents (Agent Hub)
See Agent Permissions & Access Control for details.
Data-Level Security
Control data access granularly:
Source-level permissions
Document-level access control
Query-time permission filtering
Metadata-based access rules
Incident Response
Our Commitment
In the event of a security incident:
Detection: 24/7 monitoring and alerting
Response: Immediate investigation and containment
Communication: Timely notification to affected customers
Resolution: Root cause analysis and remediation
Prevention: Implementation of preventive measures
Your Responsibilities
Help maintain security:
Report suspected security issues immediately
Monitor audit logs for anomalies
Keep credentials secure
Train users on security best practices
Follow your organization's security policies
Reporting Security Issues
If you discover a security vulnerability:
Email: [email protected]
Use our responsible disclosure process
Do not publicly disclose until we've addressed it
We'll acknowledge within 24 hours
Audit & Monitoring
Audit Logs
Comprehensive logging of security-relevant events:
User authentication and access
Permission changes
Data access and modifications
Configuration changes
API usage
Access audit logs via:
SIEM integration (Enterprise)
Monitoring & Alerts
Set up alerts for:
Failed authentication attempts
Unusual access patterns
Permission changes
Data export activities
API key usage
Configure in Administration Settings.
Compliance Resources
Documentation
Security whitepaper
Compliance certifications
Data processing agreement (DPA)
Business associate agreement (BAA)
Subprocessor list
Assessments
Request for Enterprise customers:
Security questionnaire responses
SOC 2 reports
Penetration test results
Compliance audit reports
Professional Services
Enterprise support includes:
Security architecture review
Compliance implementation guidance
Custom security controls
Dedicated security contact
Industry-Specific Security
Healthcare (HIPAA)
Business associate agreements
PHI handling and encryption
Access controls and audit logs
Breach notification procedures
See Compliance for HIPAA-specific guidance.
Financial Services
SOC 2 Type II compliance
Data residency controls
Enhanced audit logging
Penetration testing
Government
FedRAMP considerations (Enterprise)
Data sovereignty requirements
Enhanced security controls
Security FAQ
Q: Is my data used to train AI models? A: No. Your data is never used to train models for other customers or purposes.
Q: Where is my data stored? A: Data is stored in secure cloud facilities. Enterprise customers can choose specific regions.
Q: Can I export my data? A: Yes. You can export all your data at any time. See Data Privacy.
Q: Do you support private cloud or on-premises deployment? A: Yes, for Enterprise customers. Contact sales for details.
Q: How do you handle data breaches? A: We follow industry-standard incident response procedures and notify affected customers promptly.
Next Steps
For New Customers
Set up SSO Integration if needed
Read Data Privacy to understand data handling
Implement Security Best Practices
For Compliance Teams
Review Compliance certifications
Request security documentation
Schedule compliance review call
Execute data processing agreement
For Administrators
Configure User Permissions
Set up Agent Access Control
Enable audit logging
Set up security alerts
For Developers
Secure API key management (Authentication Guide)
Implement webhook signature verification
Follow secure coding practices
Review API security best practices
Support & Contact
Security Questions: [email protected]
Compliance Inquiries: [email protected]
General Support: [email protected]
Security Vulnerability Reports: [email protected] (responsible disclosure)
For urgent security matters, contact your customer success manager or enterprise support directly.
Last updated

