Security
Last updated: March 27, 2026
Security is the foundation of the Record platform. We govern AI agents for enterprises where unauthorized access, data leakage, or uncontrolled agent actions are not acceptable. This page describes the security architecture and practices we implement to protect your data and your agents.
Three Enforcement Layers
Every agent action passes through three independent enforcement layers before execution. Each layer evaluates the same Cedar policy. If any layer denies an action, execution stops.
- Application layer (Agent SDK): Intercepts every tool call. Policy checks, human-in-the-loop approval, and credential minting happen here.
- Network layer (AI Gateway): Proxies every LLM, MCP, and agent-to-agent message. Enforces content filters, rate limits, and spend caps.
- Operating-system layer (Sandbox): Monitors syscalls, file I/O, and outbound connections at the kernel level. Provides content filtering and credential injection at the network boundary.
Just-In-Time Credentials
Agents on Record do not hold standing credentials. When an agent needs to access an external service, a just-in-time credential is minted per tool call with a configurable TTL, scoped to the minimum permissions required, and injected by the platform — the agent process never sees the credential value. Every credential lifecycle event is audit-logged.
For deeper architectural detail (the mechanisms behind each layer, threat model, and sequence diagrams), request our security architecture brief under NDA at security@getrecord.ai.
Encryption
- In transit: All communications use TLS 1.2 or higher. Inter-service communication uses mutual TLS (mTLS).
- At rest: All data at rest is encrypted using AES-256. Secrets in the SecretStore are encrypted with a dedicated AES-256 key.
Tenant Isolation
Each customer's data is isolated using row-level security (RLS) in the database, tenant-scoped API tokens, and separate agent containers per tenant. Agents run in unprivileged containers with network namespaces — one tenant's agents cannot access another tenant's data, network, or compute.
Access Control
- Role-based access control (RBAC): Platform-wide roles (admin, member, viewer) enforced at the API gateway.
- Cedar policy engine: Fine-grained, attribute-based authorization for agent actions. Policies are versioned, auditable, and fail-closed by default.
- Human-in-the-loop: Critical agent actions can require explicit human approval before execution, configurable per policy.
Audit and Observability
Every governance decision, tool call, credential lifecycle event, and policy evaluation is recorded in an immutable audit trail. Distributed traces link agent actions across all three enforcement gates. Audit data is available via the web console, CLI, and API.
AI Data Protection
- Customer data is never used to train, fine-tune, or improve AI models.
- Prompts and agent interactions are routed through the AI Gateway with configurable content filters and PII redaction.
- You choose which AI model providers your agents use. Record does not send data to providers you have not configured.
Infrastructure
- Services are containerized and deployed with immutable infrastructure.
- Production environments use a two-network topology: a public-facing edge network (API only) and an internal network with no external access.
- No Docker socket access in production. Agent containers run unprivileged.
- Dependencies are regularly scanned for known vulnerabilities.
Compliance
Record is designed to meet the requirements of SOC 2 Type II, with controls mapped to the Trust Services Criteria. We are committed to achieving formal certification and will update this page as our compliance program progresses.
Incident Response
We maintain an incident response plan that covers detection, containment, eradication, recovery, and post-incident review. In the event of a security incident affecting your data, we will notify you in accordance with applicable laws and our contractual obligations.
Responsible Disclosure
If you discover a security vulnerability in the Record platform, please report it responsibly to security@getrecord.ai. We ask that you give us reasonable time to address the issue before public disclosure. We do not pursue legal action against researchers who act in good faith.
Contact
For security questions, concerns, or to request our security documentation, contact us at security@getrecord.ai.