Security Guide
A24Z is built with security and compliance at its core. This guide covers our security model, best practices, and how to ensure your organization’s data remains protected.Security Overview
Architecture Security
Multi-Tenant Isolation:- Each organization’s data is completely isolated
- Role-based access control (RBAC)
- No cross-organization data access
- Secure by default configuration
- ✅ All data encrypted in transit (TLS 1.3)
- ✅ All data encrypted at rest
- ✅ End-to-end encryption for API communications
- ✅ Encrypted database backups
- Regular security patches and updates
- Infrastructure as Code (IaC) for consistency
- Automated security scanning
- DDoS protection
Access Control
Organization Roles
A24Z implements a hierarchical role-based access control system:| Role | Access Level | Permissions |
|---|---|---|
| Admin | Full organization access | User management, billing, all data, API keys |
| CTO/VP | Organization-wide data | All team and user data, metrics, reports |
| Manager | Team data only | Team members’ data and metrics |
| User | Personal data only | Own sessions, tools, and metrics |
User Management
Adding Users:- Navigate to Settings → Team
- Invite users by email
- Assign appropriate role
- Users receive secure invitation link
- Follow principle of least privilege
- Regular access reviews (monthly recommended)
- Remove access immediately upon role changes
- Use team-based organization for easier management
- All access events are logged
- Audit logs available for Admin role
- Track login attempts, data access, and changes
- Export audit logs for compliance
API Key Security
API Key Management
Key Creation:- Backend determines all permissions (never client-controlled)
- Keys are hashed and encrypted at rest
- Only partial key shown after creation
- Cannot retrieve full key after creation
Best Practices
Key Rotation
Manual Rotation:- Can be implemented via your CI/CD pipeline
- Store keys in secret management service
- Rotate on schedule or on-demand
- Zero-downtime rotation with overlap period
Monitoring Key Usage
Alerts to Configure:- Unusual usage patterns (spike in requests)
- Geographic anomalies (requests from unexpected regions)
- Failed authentication attempts
- Usage approaching quota limits
Data Privacy
Data Collection
What We Collect:- Tool execution events (tool name, success/failure, duration)
- Token usage metrics (input tokens, output tokens, costs)
- Session metadata (session ID, timestamps)
- User and organization identifiers
- Error messages and logs
- ❌ Source code content
- ❌ File contents being edited
- ❌ Proprietary business logic
- ❌ Customer data or secrets
- ❌ Credentials or API keys
Data Retention
Default Retention:- Telemetry data: 90 days
- Audit logs: 1 year
- User data: Until account deletion
- Configure retention policies per data type
- Available for Enterprise plans
- Compliance with GDPR, CCPA, HIPAA
Compliance
Regulatory Compliance:- ✅ SOC 2 Type II certified
- ✅ GDPR compliant
- ✅ CCPA compliant
- 🔄 ISO 27001 (in progress)
- 🔄 HIPAA compliance (available on request)
- Available for Enterprise customers
- Covers data handling, security measures
- Subprocessor list maintained
- Annual security audits
Network Security
API Security
Transport Security:- TLS 1.3 required for all connections
- Certificate pinning available
- HSTS headers enforced
- Perfect forward secrecy (PFS)
- Rate limiting per API key
- Request validation and sanitization
- CORS policies enforced
- DDoS protection
- API key authentication required
- Keys must be sent via
x-api-keyheader - No authentication via query parameters
- Automatic key validation and enrichment
IP Whitelisting
Configure IP Restrictions:- Single IP:
203.0.113.42 - CIDR range:
203.0.113.0/24 - Multiple entries: comma-separated
Incident Response
Security Incident Process
Detection:- Automated monitoring and alerts
- User reports via [email protected]
- Security team monitoring
- Incident classification and prioritization
- Containment and mitigation
- Investigation and root cause analysis
- Remediation and recovery
- Post-incident review
- Critical incidents: Within 24 hours
- High severity: Within 72 hours
- Contact: [email protected]
- Status page: status.a24z.ai
Reporting Security Issues
Responsible Disclosure: If you discover a security vulnerability:- Do NOT publicly disclose the issue
- Email [email protected] with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Your contact information
- We will acknowledge within 24 hours
- We will provide updates every 72 hours
- We will credit you (if desired) after fix
- Coming soon for qualified security researchers
- Rewards for responsibly disclosed vulnerabilities
- Details at security.a24z.ai/bug-bounty
Security Checklist
Initial Setup
Ongoing Maintenance
Compliance Audit
Enterprise Security Features
Advanced Security (Enterprise)
Single Sign-On (SSO):- SAML 2.0 support
- Integration with Okta, Azure AD, Google Workspace
- Automatic user provisioning (SCIM)
- Just-in-time (JIT) provisioning
- Detailed event logging
- Log export to SIEM tools
- Real-time streaming to external systems
- Long-term retention (7+ years)
- IP whitelisting at organization level
- Session timeout configuration
- Password complexity requirements
- MFA enforcement
- Dedicated database instance
- Custom data residency (US, EU, APAC)
- Private network access
- Custom encryption keys (BYOK)
Compliance Support
Available for Enterprise:- Dedicated security team
- Custom DPA and BAA agreements
- Quarterly compliance reviews
- Penetration testing reports
- Security questionnaire assistance
- Vendor security assessments
Security Resources
Documentation
Contact
- Security Issues: [email protected]
- General Support: [email protected]
- Compliance Questions: [email protected]
- Enterprise Sales: [email protected]
Status & Transparency
- System Status: status.a24z.ai
- Security Updates: security.a24z.ai
- Compliance Certifications: a24z.ai/compliance
- Trust Center: trust.a24z.ai