Skip to main content

Compliance

Deeployd provides enterprise-grade compliance features to help you meet regulatory requirements and maintain strong governance over your AI operations.

Supported Frameworks

SOC 2 Type II

Deeployd maintains SOC 2 Type II compliance, covering:

  • Security: Protection against unauthorized access
  • Availability: System uptime and reliability
  • Processing Integrity: Accurate and complete processing
  • Confidentiality: Protection of confidential information
  • Privacy: Personal information handling

GDPR

For European customers, Deeployd supports GDPR compliance:

  • Data Processing Agreements (DPA) available
  • Right to erasure (data deletion)
  • Data portability
  • Consent management
  • Data minimization

HIPAA (Business Plan+)

Healthcare customers can achieve HIPAA compliance:

  • Business Associate Agreement (BAA) available
  • PHI encryption at rest and in transit
  • Audit logging for all PHI access
  • Access controls and authentication

ISO 27001

Deeployd's security practices align with ISO 27001:

  • Information security management system (ISMS)
  • Risk assessment and treatment
  • Security controls and policies
  • Continuous improvement

Data Handling

Encryption

All data is encrypted:

Data StateEncryption
At RestAES-256
In TransitTLS 1.3
BackupsAES-256
API KeysHashed (bcrypt)

Data Residency

Choose where your data is stored:

RegionLocation
USAWS us-east-1 (N. Virginia)
EUAWS eu-west-1 (Ireland)
APACAWS ap-southeast-1 (Singapore)

Enterprise customers can request additional regions.

Data Isolation

Multi-tenant architecture with strict isolation:

  • Tenant-level database isolation
  • Separate encryption keys per tenant
  • Network-level segmentation
  • No cross-tenant data access

Audit Logging

What's Logged

All sensitive operations are logged:

CategoryEvents
AuthenticationLogin, logout, MFA events
AgentsCreate, update, delete, execute
Data AccessMemory reads/writes, API calls
Admin ActionsUser management, settings changes
Security EventsFailed logins, permission changes

Log Format

{
"id": "log_abc123",
"timestamp": "2024-01-15T10:00:00Z",
"tenantId": "tenant_xyz",
"userId": "user_456",
"action": "agent.execute",
"resourceType": "agent",
"resourceId": "agent_789",
"ipAddress": "192.168.1.100",
"userAgent": "Mozilla/5.0...",
"success": true,
"metadata": {
"agentName": "Support Agent",
"executionTime": 1500
}
}

Log Access

const logs = await client.audit.list({
startDate: '2024-01-01',
endDate: '2024-01-31',
action: 'agent.execute',
userId: 'user-123'
});

Log Export

Export logs to external SIEM systems:

  • Splunk
  • Datadog
  • Sumo Logic
  • AWS CloudWatch
  • Custom webhook

Access Controls

Role-Based Access Control (RBAC)

RolePermissions
ViewerRead agents, view conversations
DeveloperCreate/edit agents, run tasks
AdminManage users, settings, billing
OwnerFull access, transfer ownership

Custom Roles

Create custom roles for fine-grained control:

await client.roles.create({
name: 'Support Manager',
permissions: [
'agents:read',
'agents:execute',
'conversations:read',
'conversations:write',
'tasks:read'
]
});

IP Allowlisting

Restrict access to specific IP ranges:

await client.security.setIpAllowlist({
enabled: true,
ranges: [
'192.168.1.0/24',
'10.0.0.0/8'
]
});

Retention

Data Retention Policies

Configure how long data is retained:

Data TypeDefault RetentionConfigurable
Conversation Messages90 daysYes
Agent MemoryIndefiniteYes
Audit Logs1 yearYes (min 90 days)
Task Runs30 daysYes
Analytics2 yearsYes

Configure Retention

await client.compliance.setRetentionPolicy({
conversationMessages: {
retentionDays: 365,
deleteAfterExpiry: true
},
auditLogs: {
retentionDays: 730, // 2 years
archiveAfterDays: 365
},
taskRuns: {
retentionDays: 90
}
});

Automated Deletion

Enable automatic data deletion:

await client.compliance.enableAutoDeletion({
enabled: true,
gracePeriodDays: 7, // Warning before deletion
notifyAdmins: true
});

Data Export Before Deletion

Export data before automatic deletion:

await client.compliance.setPreDeletionExport({
enabled: true,
destination: 's3://your-bucket/exports',
format: 'json'
});

Prevent deletion for compliance/legal reasons:

// Place data on legal hold
await client.compliance.createLegalHold({
name: 'Investigation 2024-001',
scope: {
userIds: ['user-123'],
dateRange: {
start: '2024-01-01',
end: '2024-03-31'
}
}
});

// Data under hold won't be deleted

Privacy Controls

Data Minimization

Control what data agents can access:

await client.agents.update('agent-123', {
dataAccess: {
piiAccess: false,
allowedFields: ['name', 'email'],
blockedFields: ['ssn', 'credit_card']
}
});

Track user consent:

await client.privacy.recordConsent({
userId: 'user-123',
consentType: 'data_processing',
granted: true,
timestamp: new Date().toISOString(),
source: 'web_form'
});

Data Subject Requests

Handle GDPR/CCPA requests:

// Right to access
const data = await client.privacy.exportUserData('user-123');

// Right to erasure
await client.privacy.deleteUserData('user-123', {
includeConversations: true,
includeMemory: true,
retainAuditLogs: true // May be required for compliance
});

// Right to portability
const export = await client.privacy.exportPortable('user-123', {
format: 'json',
includeAgentInteractions: true
});

Certifications & Reports

Available Documents

DocumentAvailability
SOC 2 Type II ReportOn request (NDA)
Penetration Test SummaryOn request
Privacy PolicyPublic
Terms of ServicePublic
DPAOn request
BAA (HIPAA)Enterprise only

Request Documents

Contact compliance@deeployd.com or through the Dashboard:

  1. Go to SettingsSecurity
  2. Click Compliance Documents
  3. Request specific documents

Compliance Dashboard

Monitor your compliance posture:

  1. Go to SettingsCompliance
  2. View compliance score
  3. See outstanding items
  4. Download reports

Compliance Score

Your compliance score is based on:

  • MFA adoption rate
  • SSO configuration
  • Audit log retention
  • Data retention policies
  • IP allowlisting
  • Role configuration

Best Practices

1. Enable MFA

Require MFA for all users, especially admins.

2. Use SSO

Integrate with your identity provider for centralized access control.

3. Configure Retention

Set appropriate retention policies for your compliance needs.

4. Monitor Audit Logs

Regularly review audit logs for suspicious activity.

5. Limit Permissions

Follow the principle of least privilege for user roles.

6. Regular Access Reviews

Periodically review who has access to what.


Next: Learn about Audit Logs for detailed activity tracking.