BasicAgent

Security & Data Handling

Security & Data Handling — How we think about security for provenance-first agent pipelines (self-host, least privilege, logging hygiene).

This page is a practical overview of security posture for agent workflows.

Not legal advice. Replace placeholders with your real controls and practices.

High-level stance

  • Prefer self-host deployments for regulated workflows.
  • Minimize data sent to third-party providers.
  • Treat logs as sensitive: redact, encrypt, and control retention.

Common controls (baseline)

  • Secrets stored in a secret manager (no keys in code)
  • Principle of least privilege (service accounts per workflow)
  • Separate environments (dev/stage/prod)
  • Audit logs stored immutably (append-only storage or WORM where required)
  • Encryption at rest + in transit

LLM-specific practices

  • Disable prompt logging where required (or redact sensitive fields)
  • Store references to artifacts instead of raw content when possible
  • Attach stable run IDs and stage spans to support replay/debug without data sprawl

Questions enterprises ask (answer these)

  • Where does data flow? (diagram)
  • What gets logged? How long? Where?
  • How do you prevent prompt injection / data exfiltration?
  • How do you evaluate and monitor regression?

Create account

Create account