Auteryn is built with enterprise-grade security from the ground up. Your data, your agents, and your customers are protected by industry-leading security practices.
๐
SOC 2 Type II
Certified
๐ก๏ธ
GDPR
Compliant
โ
99.9%
Uptime SLA
๐
AES-256
Encryption
Security Overview
Data Encryption
In Transit:
TLS 1.3 for all API communications
Perfect forward secrecy
Certificate pinning for mobile apps
Encrypted WebSocket connections
At Rest:
AES-256 encryption for all stored data
Encrypted database backups
Encrypted file storage (S3 with SSE)
Hardware security modules (HSM) for key management
Infrastructure Security
Isolated Sandboxes
Each agent runs in an isolated microVM with strict resource limits and network policies.
Network Segmentation
Multi-layer network isolation between customer environments, control plane, and data plane.
DDoS Protection
CloudFlare Enterprise with automatic DDoS mitigation and WAF protection.
Intrusion Detection
Real-time monitoring with automated threat detection and response.
Access Control
Authentication:
Multi-factor authentication (MFA) required for all accounts
SSO support (SAML 2.0, OAuth 2.0)
API key rotation and expiration policies
Session management with automatic timeout
Authorization:
Role-based access control (RBAC)
Principle of least privilege
Granular permissions per agent and resource
Audit logs for all access events
Compliance & Certifications
SOC 2 Type II
Auteryn has completed SOC 2 Type II audit covering:
Security - Protection against unauthorized access
Availability - System uptime and performance
Processing Integrity - Complete and accurate processing
Confidentiality - Protection of confidential information
Privacy - Collection, use, and disposal of personal information
Real-time monitoring - All services monitored 24/7
Automated alerts - Immediate notification of issues
Performance tracking - API latency, error rates, uptime
Incident management - PagerDuty integration
Questions?
Common Security Questions
Q: Where is my data stored?
A: Primary data is stored in US East (Virginia) with backups in US West (Oregon). EU data residency available for Enterprise.
Q: Can Auteryn access my data?
A: Only authorized support engineers with explicit customer permission can access data for troubleshooting. All access is logged.
Q: How do you handle AI model security?
A: We use enterprise API endpoints from OpenAI, Anthropic, and Google with strict data processing agreements. Your data is not used for model training.
Q: What happens if thereโs a breach?
A: We follow our incident response plan and notify affected customers within 72 hours as required by GDPR.
Q: Can I run Auteryn in my own cloud?
A: Yes, private cloud deployment is available for Enterprise customers.