Security and privacy you can operationalize
Upcube is built to support safe deployment: strong access controls, scoped tooling, auditability, and privacy-minded data handling. This page outlines the controls we prioritize and the baseline we recommend for real-world use.
Core principles
The security posture we optimize for: practical controls, measurable checks, and reliable incident response.
Secure by design
- Defense-in-depth across app, infra, and model integrations.
- Threat modeling for new surfaces (agents, tools, connectors).
- Least-privilege by default for actions and data access.
Strong access controls
- Role-based access control (RBAC) and scoped permissions.
- Audit logs for admin actions, config changes, and tool calls.
- Rate limits and allow/deny lists for tool and web access.
Privacy-first handling
- Data minimization, scoped retention, and purpose limitation.
- Separation of concerns with tenant isolation where applicable.
- User controls for visibility and safer defaults for sensitive topics.
Controls that matter
This is the stuff you actually use in production: policy boundaries, visibility, permissions, and fast containment when the world gets messy.
Customer controls
Practical defaults you can enforce and audit.
- Workspace / tenant policiesEnforce allowed tools, connectors, and content boundaries.
- Visibility controlsWhere feasible: sources, citations, and activity summaries.
- Safer-mode togglesExtra friction and warnings for sensitive categories.
Monitoring & incident response
Practical defaults you can enforce and audit.
- Telemetry + alertingAnomaly detection and abuse signals.
- Triage SLAsSeverity-based on-call and escalation paths.
- ContainmentScoped rollbacks, throttles, and kill-switches.
- PostmortemsBlameless reviews with tracked remediations.
Governance & compliance support
Practical defaults you can enforce and audit.
- Security reviewsGated launches for risky capabilities.
- Data governanceLeast privilege + logged elevations.
- Compliance supportDPA on request; aligned privacy workflows.
Recommended admin baseline
If you do nothing else, do these first.
- Enable SSO (if available) and enforce MFA for admins.
- Lock down tool access: start with allow-lists, expand gradually.
- Turn on audit logs and review them during onboarding.
- Use scoped API keys and rotate on a schedule or after incidents.
- Set retention to the minimum that supports your workflow.
- Create an incident channel + runbook for escalation and comms.
Operational posture
How we think about security in real deployments.
- Encrypt in transit and at rest where applicable.
- Minimize stored content; limit logs to what you need.
- Separate customer content from system telemetry.
- Explicit opt-in for tool calls and external side effects.
- Hard boundaries for high-risk actions (payments, deletion).
- Domain allow/deny lists for web-connected tools.
- Regression suites for jailbreaks, leakage, and prompt injection.
- Shadow launches for risky changes with monitoring gates.
- Continuous re-evals when models, tools, or policies change.
FAQ
Do you train on my content?
What happens when something goes wrong?
How do you handle tool-call risk?
Report an issue / contact
Security contact
For vulnerabilities or urgent reports, include reproduction steps and impact.