Security & compliance

How AgenticX protects your data, controls access, and reports our compliance posture.

For HIPAA / HITECH posture, see our canonical answer in the Security FAQ Q34.

Platform security

  • Encryption at rest & in transit

    All data encrypted with AES-256 at rest and TLS 1.3 in transit. Database connections use SSL. S3 storage uses server-side encryption.

  • Role-based access control

    Granular RBAC across owner / admin / member / viewer roles. SSO / SAML support is on the Enterprise plan roadmap. MFA available on every account.

  • Multi-tenant isolation

    Tenant isolation enforced at the database level via Postgres row-level security (RLS). No cross-tenant data access is possible — even on errors.

  • Audit logging

    Every agent run, login, data access, and configuration change is logged with timestamp, user, and IP. Audit logs retained per the per-network policy.

  • API key management

    Scoped API keys with automatic rotation reminders and instant revocation. Keys are hashed at rest and never stored in plaintext.

  • Infrastructure security

    AWS-native deployment with VPC isolation, private subnets for the database tier, and security-group ingress controls. No public database access.

Compliance posture

  • SOC 2 Type II

    In progress

    Security, availability, and confidentiality trust-service criteria. Audit completion targeted for Q3 2026.

  • GDPR

    Active

    EU data-processing agreements available. Data export and deletion on request. Privacy-by-design architecture.

  • Data residency

    Active

    Primary infrastructure in AWS US-East-1 (Virginia). Enterprise customers can request specific regional deployment.

  • Penetration testing

    Active

    Regular third-party penetration testing. Responsible-disclosure program for security researchers.

Architecture

  • AWS ECS Fargate — serverless containers, no shared host access
  • Amazon RDS PostgreSQL — automated backups, encryption, multi-AZ
  • AWS Secrets Manager — no credentials in code or environment variables
  • Application Load Balancer with WAF rules and DDoS protection
  • CloudWatch monitoring with alerting on anomalous access patterns
  • Container image scanning via Amazon ECR for known vulnerabilities

Questions? Email security@agenticx.brightridgeai.com.