NORTHSTAR
Security & Reliability

Security & Reliability

Explicit controls: zero-retention handling, scoped tool access, approval gates, and audit sinks.

retention: 0mstls: 1.3audit_sink: siemdeploy: vpc|hybrid

Zero-Retention Handling

Workflow execution runs in ephemeral memory with explicit boundaries and wipe semantics.

Ephemeral containers for execution
No training on customer data
PII boundaries and scrub policies
Retention controls documented per workflow

Access Control

Least-privilege tool access with scoped auth and explicit approvals for high-risk actions.

Scoped OAuth tokens per connector
Human-loop approval gates (Slack/Teams)
Idempotency + rollback-safe writes
Kill switch + incident runbooks

Auditability

Every action is logged with trace IDs, tool contracts, and approval metadata.

Structured event stream per state transition
Customer-owned sinks (SIEM) supported
Replayable run records (when enabled)
Per-tool error envelopes + retries

Encryption + Network Controls

Transport encryption and network isolation patterns appropriate for enterprise stacks.

TLS 1.3 in transit
VPC / hybrid deployment options
Private networking patterns (where applicable)
Change management + controlled rollouts

Compliance Posture

SOC 2 Type II

Docs on request

GDPR

Supported

CCPA

Supported

HIPAA

By scope

ISO 27001

By roadmap

Data Handling Practices

Data Processing

  • Data processed only for contracted purposes
  • No training on customer data
  • Data minimization principles
  • Clear data retention policies

Human Oversight

  • Configurable approval workflows
  • Real-time action monitoring
  • Instant kill switches
  • Escalation triggers

Vendor Management

  • Vetted AI model providers
  • Data processing agreements
  • Regular security reviews
  • Incident response procedures

Security Questions?

Request our security documentation or schedule a call with our security team.