Security Protocols
Last Updated: January 16, 2026
1. Our Security Philosophy
At Apex Agentics, we treat your operational data and credentials with the same rigor as financial assets. Our security architecture is designed to minimize attack surfaces while enabling robust automation. We practice "Least Privilege" access and "Security by Design" in every workflow we build.
2. Infrastructure & Encryption
Data in Transit: All data transmitted between your systems, our servers, and third-party APIs is encrypted using TLS 1.3 (Transport Layer Security).
Data at Rest: All database records and logs are encrypted at rest using AES-256 standards.
Hosting: Our core infrastructure is hosted on industry-leading cloud providers (e.g., AWS, Supabase, Vercel) that maintain SOC 2 Type II and ISO 27001 certifications.
3. Credential Management (Secrets)
We never hard-code sensitive credentials (API Keys, OAuth Tokens, Passwords) into workflow scripts or repositories.
Secrets Management: We utilize enterprise-grade secrets managers (e.g., AWS Secrets Manager, Vault, or encrypted Environment Variables) to inject credentials only at runtime.
Token Rotation: We support and encourage the use of temporary access tokens rather than long-lived API keys whenever your tech stack supports it.
4. AI Safety & Data Isolation
Zero-Training Policy: As stated in our Privacy Policy, we explicitly configure AI model providers (OpenAI, Anthropic) to opt-out of using your data for model training.
Data Sanitization: Where possible, we implement pre-processing scripts to redact Personally Identifiable Information (PII) before sending payloads to Large Language Models (LLMs).
Human-in-the-Loop: For high-stakes workflows (e.g., financial transfers, public communications), we can architect "Human-in-the-Loop" approval steps to prevent unauthorized autonomous actions.
5. Access Control
Role-Based Access (RBAC): Access to your project files and configurations is restricted to the specific engineers actively working on your account.
MFA Enforcement: Multi-Factor Authentication (MFA) is enforced for all Apex Agentics team members across all development and administrative platforms.
6. Incident Response
In the unlikely event of a security breach or data leak, we have a predefined Incident Response Plan. We are committed to notifying affected clients within 72 hours of confirming a breach, providing a full transparency report and remediation steps.
7. Vulnerability Disclosure
If you identify a potential security vulnerability in any of our tools or deployments, please contact our security team immediately at: security@apexagentics.io