Privacy & Security
Built‑in controls and encryption safeguard assets and data:
End‑to‑End Encryption: TLS 1.3 for all network communication and AES‑256 encryption for data at rest, with hardware security module (HSM) integration for key management.
Role‑Based Access Control (RBAC): Fine‑grained permissions govern access to datasets, model endpoints, and execution capabilities, supported by LDAP and OAuth2.
Audit Logging & Compliance: Immutable, tamper‑evident logs capture all agent actions, API calls, and configuration changes, facilitating regulatory reporting (e.g., MiFID II, SOC 2).
Secure Development Lifecycle: Automated security scans (SAST/DAST), vulnerability patching, and periodic penetration testing ensure ongoing platform integrity.
Last updated