Skip to main content

Security Overview

MeetLoyd is built with enterprise security at every layer. Whether you are on Starter or Enterprise, your data is isolated, encrypted, and auditable from day one.

Security Center

Growth and Enterprise users can access all security features from the Security Center in the top navigation bar -- a single hub for approvals, audit logs, SSO, SCIM, incidents, and more. Learn more about Security Center.

Security Architecture

Every request to MeetLoyd passes through three layers before it reaches your agents or data:

  1. Authentication -- Who are you? JWT sessions, API keys, SSO/SAML, or MFA verify identity at the door.
  2. Authorization -- What can you do? Role-based access control (RBAC), granular permissions, and strict tenant isolation ensure you only touch what you own.
  3. Audit -- What happened? Every action is logged, exportable to SIEM tools, and available for compliance review. The Audit Cockpit provides a unified investigation interface with real-time event timelines, agent interaction graphs, anomaly detection, and tamper-proof PDF export.

These layers are always active. There is no way to bypass them -- even internal platform operations go through the same pipeline.

Key Security Features

lock
Authentication
shield
Authorization
verified
Compliance
storage
Data Protection

Security by Plan

FeatureStarterGrowthEnterprise
JWT AuthYesYesYes
API Keys550Unlimited
MFA/2FAYesYesYes
SSO/SAML----Yes
SCIM----Yes
Audit Logs30 days visible (90 days stored)90 days visible (180 days stored)Unlimited
SIEM Export----Yes
Custom Retention----Yes
IP Allowlisting----Yes
Granular Permissions112112112 + Custom Roles
Custom SLAs----Yes

Data Protection

Encryption

StateMethod
In TransitTLS 1.3
At RestAES-256-GCM (envelope encryption)
SecretsAES-256 with key rotation
BackupsEncrypted with separate keys
Memory contentAES-256-GCM (embeddings stay cleartext for search)
ReportsAES-256-GCM with workspace Drive sync

Envelope Encryption (Growth+)

Content encryption at rest uses a three-level envelope encryption hierarchy:

  • Platform Master Key protects all tenant keys
  • Tenant KEK (Key Encryption Key) wraps the data keys for each tenant
  • Team/Agent DEK (Data Encryption Key) encrypts actual content
info

Envelope encryption is auto-triggered when you enable HIPAA or GDPR governance packs. Key rotation is instant for DEK re-wrapping, and content is re-encrypted lazily on next read. Embeddings stay cleartext because they are lossy projections that cannot reconstruct the original content -- this preserves semantic search.

KMS providers (Enterprise): AWS KMS, GCP Cloud KMS, Azure Key Vault, Local (air-gapped).

Bring Your Own Storage (Enterprise)

Enterprise customers can store business data in their own infrastructure:

ProviderDescription
AWS S3Primary cloud storage
Google Cloud StorageGCP customers
Azure Blob StorageAzure customers
MeetLoyd R2Default (Cloudflare R2)

BYOS includes connectivity testing, resumable data migration, and circuit breaker health monitoring with automatic fallback to R2.

Data Residency

Enterprise customers can choose data location:

  • US: Virginia, Oregon
  • EU: Frankfurt, Ireland
  • APAC: Singapore, Sydney

Data Retention

Default retention periods (all configurable on Enterprise):

Data TypeDefault
Conversations90 days
Audit Logs30 days
Agent Memory90 days
Task History30 days

Compliance Standards

MeetLoyd maintains compliance with:

  • SOC 2 Type II -- Security, availability, confidentiality
  • GDPR -- EU data protection
  • CCPA -- California privacy
  • HIPAA -- Healthcare (Enterprise)
  • ISO 27001 -- Information security (in progress)

For a detailed look at how MeetLoyd aligns with the OWASP Agentic Top 10 and the Agent Trust Framework, see Zero Trust for Agents.

Security Best Practices

Security Contact

For security issues or vulnerability reports, please email security@meetloyd.com.


Next: Learn about Authentication in detail.