Security

Security Practices

How we protect your data and infrastructure

Security isn't a feature at AgentAIShield — it's the foundation. We're in the business of protecting AI agents, which means we hold ourselves to a higher standard than most. This page describes the technical and organizational controls we apply to protect your data and our infrastructure.

Built Security-First

Every system, every service, and every hire at AgentAIShield starts with security requirements. We follow defense-in-depth principles and continuously improve our posture as the threat landscape evolves.

1. Infrastructure Security

AgentAIShield is hosted on AWS (primary) and Railway (ancillary services), leveraging enterprise-grade cloud infrastructure with industry-leading physical and network security. All compute is isolated — each service runs in its own container with no shared process space between customers.

2. Encryption

2.1 In Transit

All data in transit is encrypted using TLS 1.3. We reject connections on TLS 1.0 and 1.1. Our API endpoints enforce HTTPS with HSTS headers and are rated A+ on SSL Labs. Certificate management is automated via Let's Encrypt / AWS ACM with automatic renewal.

2.2 At Rest

All stored data — databases, object storage, and backups — is encrypted using AES-256. Encryption keys are managed in AWS KMS with automatic annual rotation. Database credentials are stored in AWS Secrets Manager, never in environment variables or source code.

2.3 Backups

Automated encrypted backups run daily. Backups are stored in a geographically separate AWS region. Backup encryption keys are distinct from primary data keys. Restore procedures are tested quarterly.

3. Access Control

3.1 Role-Based Access

Internal access to production systems follows strict role-based access control (RBAC). Engineers have access only to the services required for their role. Access is reviewed quarterly and revoked immediately upon offboarding.

3.2 API Key Scoping

Customer API keys are scoped by default to read-only or write-only operations. Enterprise customers can define custom permission scopes per key. All key usage is logged and auditable from the dashboard. Keys are hashed before storage — we never store plaintext API keys.

3.3 MFA Support

All internal staff accounts require multi-factor authentication (MFA) enforced at the IdP level. Customer accounts support TOTP-based MFA (available on all plans) and SSO/SAML (Business and Enterprise). We strongly recommend enabling MFA on all customer accounts.

3.4 Privileged Access

Production database access requires time-limited credentials issued via a PAM system, with every session logged. No standing privileged access exists — engineers request access, it is granted for the task duration, then automatically revoked.

4. Data Isolation

AgentAIShield is a multi-tenant platform with strict organization-level data isolation. Each organization's data — API logs, Trust Scores, configurations, and billing records — is logically isolated by organization ID, enforced at both the application and database query layers.

5. SOC 2 Compliance

We are actively on our SOC 2 Type II compliance journey. Our controls are designed around the AICPA Trust Service Criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy. Milestones:

6. Penetration Testing

We take a proactive approach to finding vulnerabilities before adversaries do:

7. Incident Response

We maintain a documented Incident Response Plan (IRP) that is tested semi-annually via tabletop exercises. Our response commitments:

8. Vulnerability Disclosure

We believe in coordinated disclosure and welcome reports from the security community. Our responsible disclosure policy:

9. Data Retention

We don't hold your data longer than necessary:

10. Employee Security

Our people are our first line of defense — and a potential attack surface. We address both:

Security questions or concerns?

We take every security inquiry seriously. Contact us directly.

Security: [email protected]

General: [email protected]

AgentAIShield by You! Ventures LLC
Austin, TX, United States