Skip to main content

Security Center

The Security Center is a centralized hub for managing all security-related features in Deeployd. It provides a unified interface for security administrators to monitor, configure, and respond to security events.

Access Requirements

Plan Requirements

PlanAccess
Starter-
Pro-
BusinessFull Access
EnterpriseFull Access

Role Requirements

RoleAccess
Viewer-
Member-
AI Engineer-
AdminFull Access
OwnerFull Access

Accessing Security Center

The Security Center is accessible from the top navigation bar for users with Business or Enterprise plans and admin/owner roles:

  1. Log in to your Deeployd dashboard
  2. Look for the Security button in the top bar (shield icon)
  3. Click to access the Security Center hub

Security Center Features

The Security Center consolidates all security management into one location:

Approvals

Manage human-in-the-loop approval workflows for sensitive agent operations.

  • Configure approval policies
  • Review pending approvals
  • View approval history
  • Set up trusted patterns to auto-approve certain operations

Learn more about Approvals

Delegations

Control which users can approve operations on behalf of others.

  • Create delegation rules
  • Set delegation expiry
  • Audit delegation usage

Audit Logs

Complete visibility into all platform activity.

  • Search and filter logs
  • Export logs for compliance
  • Configure retention policies
  • Set up alerts for specific events

Learn more about Audit Logs

Incidents

Track and respond to security incidents.

  • View active incidents
  • Track incident timeline
  • Assign responders
  • Document resolution steps

Learn more about Incidents

SSO Configuration

Manage Single Sign-On settings for your organization.

  • Configure SAML/OIDC providers
  • Manage identity provider mappings
  • Enforce SSO for all users

Learn more about SSO

SCIM Provisioning

Automate user provisioning and deprovisioning.

  • Configure SCIM endpoints
  • Map user attributes
  • Sync groups from identity provider

Learn more about SCIM

SIEM Integration

Export security events to external security tools.

  • Configure SIEM destinations
  • Map event types
  • Set up real-time streaming

Learn more about SIEM

Access Reviews

Periodic review of user permissions and access.

  • Schedule access reviews
  • Assign reviewers
  • Track review completion
  • Generate compliance reports

Learn more about Access Reviews

Session Management

Monitor and manage active user sessions.

  • View active sessions
  • Force session logout
  • Configure session policies
  • Set idle timeout rules

Learn more about Session Management

Quick Actions

From the Security Center dashboard, you can quickly:

  • View recent security events: See a timeline of recent security-relevant actions
  • Check compliance status: Overview of your security posture
  • Review pending approvals: Quickly approve or deny pending requests
  • Check for active incidents: See if there are any ongoing security incidents

Dashboard Navigation

The Security Center uses sub-navigation tabs to organize features:

Security Center
├── Overview (default)
├── Approvals
├── Delegations
├── Audit Logs
├── Incidents
├── SSO
├── SCIM
├── SIEM
├── Access Reviews
└── Sessions

Best Practices

Regular Reviews

  1. Daily: Check for pending approvals and active incidents
  2. Weekly: Review audit logs for unusual activity
  3. Monthly: Conduct access reviews
  4. Quarterly: Review and update security policies
// Enable comprehensive security settings
await client.settings.update({
security: {
// Require approval for sensitive operations
approvalRequired: ['agent.delete', 'connection.modify', 'user.invite'],

// Configure session policies
sessionIdleTimeout: 30, // minutes
sessionMaxDuration: 480, // minutes (8 hours)

// Audit log retention
auditLogRetention: 90, // days

// SIEM export
siemEnabled: true,
siemDestination: 'https://siem.company.com/api/events'
}
});

Feature Availability by Plan

FeatureBusinessEnterprise
ApprovalsFullFull
DelegationsFullFull
Audit Logs90 daysCustom
IncidentsFullFull
SSOFullFull
SCIMFullFull
SIEM-Full
Access ReviewsBasicFull
SessionsFullFull
Custom Policies-Full

Next: Learn about Authentication for user access control.