Security
Privacy & Data Protection
Learn how Engrami protects your data with enterprise-grade security and complete data sovereignty.
Data Sovereignty Architecture
Engrami's unique Control Plane + Data Plane architecture ensures your sensitive data never leaves your infrastructure.
Control Plane (Engrami Hosted)
- ✓ Agent definitions (metadata only)
- ✓ Workflow configurations
- ✓ Billing & usage metrics
- ✓ Dashboard & management UI
- ✗ No customer data stored
Data Plane (Your VPC)
- ✓ All conversation data
- ✓ Agent memory stores
- ✓ Vector embeddings
- ✓ Knowledge base content
- ✓ LLM API connections
Encryption
Data at Rest
- Database Encryption - AES-256 encryption for all stored data
- Key Management - AWS KMS or customer-managed keys (BYOK)
- Vector Store - Encrypted embeddings in ChromaDB/Pinecone
- Secrets - Vault-based secret storage with rotation
Data in Transit
- TLS 1.3 - All API communications encrypted
- mTLS - Mutual TLS between Control and Data Planes
- Certificate Pinning - Prevents MITM attacks
Access Control
Authentication
- JWT-based authentication with short-lived tokens
- OAuth 2.0 / OIDC integration
- SAML 2.0 for enterprise SSO
- Multi-factor authentication (MFA)
Authorization
- RBAC - Role-based access control with custom roles
- Tenant Isolation - Complete data isolation between tenants
- API Scopes - Fine-grained API key permissions
- Resource Policies - Agent and workflow-level access controls
Data Handling
Data Collection
Engrami collects minimal data necessary for operation:
- Account Data - Email, name, organization
- Usage Metrics - API calls, token counts (no content)
- Audit Logs - Actions performed (configurable retention)
Data Retention
# Configure retention policies
{
"memory_retention": {
"semantic": "indefinite", // Until manually deleted
"episodic": "90_days", // Auto-expire after 90 days
"procedural": "indefinite"
},
"audit_logs": "365_days",
"conversation_history": "custom" // User-defined
}Data Deletion
- Soft Delete - Data marked for deletion, recoverable for 30 days
- Hard Delete - Permanent deletion with cryptographic erasure
- Account Deletion - Complete data removal within 30 days
- Right to Erasure - GDPR Article 17 compliant
Privacy Controls
PII Detection
Automatic detection and handling of personally identifiable information:
{
"pii_detection": {
"enabled": true,
"types": ["email", "phone", "ssn", "credit_card", "address"],
"action": "redact", // or "mask", "flag", "block"
"log_detections": true
}
}Data Masking
Mask sensitive data in logs and exports:
# Before masking
"Customer email is john.doe@company.com, SSN 123-45-6789"
# After masking
"Customer email is j***@c***.com, SSN ***-**-****"LLM Privacy
Protect your data when using external LLM providers:
- No Training - Data not used to train provider models (OpenAI, Anthropic enterprise tiers)
- Local Models - Option to use self-hosted models (Llama, Mistral)
- Prompt Filtering - Remove sensitive data before LLM calls
- Response Filtering - Scan responses for leaked PII