Security

AI agents operate where your SIEM has no visibility.

Your existing security controls were built for humans and predictable pipelines. AI agents read data, write code, chain actions across systems, and delegate to sub-agents — none of that shows up in your audit log. AgentLattice is the governance layer that closes that gap.

Security questions? security@agentlattice.com

Threat
Agent privilege escalation via delegation chains
Threat
Prompt injection propagating through multi-agent systems
Threat
Bulk data exfiltration by a compromised or runaway agent

Security Controls

What is in place today, not aspirational claims.

Infrastructure Security

  • AES-256 encryption at rest (Postgres)
  • TLS 1.2+ encryption in transit
  • Logical tenant isolation via row-level security
  • DDoS protection at edge
  • Web Application Firewall (WAF)
  • Supabase-hosted — no shared compute between tenants

Identity & Access

  • MFA enforcement, admin-controlled
  • Role-based access control (RBAC) with least-privilege defaults
  • Scoped API keys with configurable expiration
  • Keys hashed at rest (SHA-256), shown once at creation
  • No standing production access for employees
  • Session timeout and instant revocation

Audit & Monitoring

  • Cryptographically chained audit logs — tamper-evident by design
  • ECDSA-signed checkpoints for scalable verification
  • Behavioral anomaly detection across 5 signal types
  • Graduated enforcement: WARN → THROTTLE → HALT → KILL
  • Separate tamper-proof enforcement log chain
  • Webhook export for SIEM integration (Splunk, Datadog, Microsoft Sentinel, Elastic, Sumo Logic)

Data Handling

  • AgentLattice processes action metadata only — never your agent's actual data
  • What is stored: action type, resource category, record count, sensitivity level
  • What is never stored: file contents, API payloads, database records
  • Full subprocessor list published and updated
  • GDPR-compliant — DPA template available for download

Operational Security

  • 99.9% uptime SLA — documented RTO < 4h, RPO < 1h
  • Documented incident response plan, 72-hour breach notification
  • Background checks required for all employees with data access
  • Annual security awareness training, tracked
  • Managed endpoints (MDM) for all staff
  • Third-party penetration testing in progress

SSO & Provisioning

  • SSO via SAML 2.0 — on roadmap
  • SSO via OIDC — on roadmap
  • SCIM v2 provisioning/deprovisioning — on roadmap
  • JIT provisioning via IdP assertion — follows SSO
  • Contact us to discuss your IdP requirements before GA

Compliance & Certifications

Completed certifications and active programs in progress.

GDPR
CompliantDPA available on request
CCPA
CompliantCalifornia consumer rights honored
SOC 2 Type II
In ProgressAudit in progress via Vanta — expected Q4 2026
CSA STAR Level 1
In ProgressCAIQ self-assessment in progress

SOC 2 Type II report will be available to enterprise prospects under NDA upon completion. Request early access to readiness evidence.

Threat Coverage

The threats AgentLattice is purpose-built to address.

ThreatMitigation
Unauthorized agent actionsEvery action evaluated against org policies. No policy match = action denied.
Privilege escalation via delegationMonotonic scope narrowing enforced server-side. Children cannot exceed parent capabilities.
Audit trail tamperingSHA-256 hash chain with ECDSA checkpoint signing. Modifying any event breaks the chain detectably.
Compromised agent API keyImmediate revocation, 24-hour TTL on delegation tokens, cascade revocation for child agents.
Bulk data exfiltrationBehavioral baselines detect volume anomalies. Circuit breaker halts the agent automatically.
Prompt injection propagationCross-agent correlation detects anomalous behavior propagating through delegation chains.
Insider threat (human operator)Segregation of duties enforcement. All human actions, including MCP operations, are audit-logged.
Agent self-replicationHard limit of 10 active ephemeral children per parent, enforced at application and database level.
Scope boundaries

AgentLattice governs agents that route actions through the SDK or MCP gateway. Agents that call external APIs without SDK instrumentation are out of scope. AgentLattice has the same trust posture as your identity provider — compromise of AgentLattice infrastructure itself is not within the threat model above.

Subprocessors
View subprocessor list

All vendors with access to customer data

Compliance Docs
SOC 2 and compliance evidence guide

Framework mappings and evidence export

Security Contact
security@agentlattice.com

Security reviews, pen test reports under NDA, vulnerability disclosure