Security Center
The Security Center is a centralized hub for managing all security-related features in Deeployd. It provides a unified interface for security administrators to monitor, configure, and respond to security events.
Access Requirements
Plan Requirements
| Plan | Access |
|---|---|
| Starter | - |
| Pro | - |
| Business | Full Access |
| Enterprise | Full Access |
Role Requirements
| Role | Access |
|---|---|
| Viewer | - |
| Member | - |
| AI Engineer | - |
| Admin | Full Access |
| Owner | Full Access |
Accessing Security Center
The Security Center is accessible from the top navigation bar for users with Business or Enterprise plans and admin/owner roles:
- Log in to your Deeployd dashboard
- Look for the Security button in the top bar (shield icon)
- Click to access the Security Center hub
Security Center Features
The Security Center consolidates all security management into one location:
Approvals
Manage human-in-the-loop approval workflows for sensitive agent operations.
- Configure approval policies
- Review pending approvals
- View approval history
- Set up trusted patterns to auto-approve certain operations
Delegations
Control which users can approve operations on behalf of others.
- Create delegation rules
- Set delegation expiry
- Audit delegation usage
Audit Logs
Complete visibility into all platform activity.
- Search and filter logs
- Export logs for compliance
- Configure retention policies
- Set up alerts for specific events
Incidents
Track and respond to security incidents.
- View active incidents
- Track incident timeline
- Assign responders
- Document resolution steps
SSO Configuration
Manage Single Sign-On settings for your organization.
- Configure SAML/OIDC providers
- Manage identity provider mappings
- Enforce SSO for all users
SCIM Provisioning
Automate user provisioning and deprovisioning.
- Configure SCIM endpoints
- Map user attributes
- Sync groups from identity provider
SIEM Integration
Export security events to external security tools.
- Configure SIEM destinations
- Map event types
- Set up real-time streaming
Access Reviews
Periodic review of user permissions and access.
- Schedule access reviews
- Assign reviewers
- Track review completion
- Generate compliance reports
Learn more about Access Reviews
Session Management
Monitor and manage active user sessions.
- View active sessions
- Force session logout
- Configure session policies
- Set idle timeout rules
Learn more about Session Management
Quick Actions
From the Security Center dashboard, you can quickly:
- View recent security events: See a timeline of recent security-relevant actions
- Check compliance status: Overview of your security posture
- Review pending approvals: Quickly approve or deny pending requests
- Check for active incidents: See if there are any ongoing security incidents
Dashboard Navigation
The Security Center uses sub-navigation tabs to organize features:
Security Center
├── Overview (default)
├── Approvals
├── Delegations
├── Audit Logs
├── Incidents
├── SSO
├── SCIM
├── SIEM
├── Access Reviews
└── Sessions
Best Practices
Regular Reviews
- Daily: Check for pending approvals and active incidents
- Weekly: Review audit logs for unusual activity
- Monthly: Conduct access reviews
- Quarterly: Review and update security policies
Recommended Configuration
// Enable comprehensive security settings
await client.settings.update({
security: {
// Require approval for sensitive operations
approvalRequired: ['agent.delete', 'connection.modify', 'user.invite'],
// Configure session policies
sessionIdleTimeout: 30, // minutes
sessionMaxDuration: 480, // minutes (8 hours)
// Audit log retention
auditLogRetention: 90, // days
// SIEM export
siemEnabled: true,
siemDestination: 'https://siem.company.com/api/events'
}
});
Feature Availability by Plan
| Feature | Business | Enterprise |
|---|---|---|
| Approvals | Full | Full |
| Delegations | Full | Full |
| Audit Logs | 90 days | Custom |
| Incidents | Full | Full |
| SSO | Full | Full |
| SCIM | Full | Full |
| SIEM | - | Full |
| Access Reviews | Basic | Full |
| Sessions | Full | Full |
| Custom Policies | - | Full |
Next: Learn about Authentication for user access control.