Documentation Cloud4.ai
HomeCloud ConsoleDiscord Community
  • 🌟Cloud4.ai Documentation
  • Introduction
    • Overview
    • Security
    • 💸Pricing
    • 😀Commission to Model Developers
    • Backlog
    • Enterprise
  • SDK
    • 🚩Quick Start
    • 🔐Authentication
    • ⚙️Configurations & Env Variables
    • ⭐Request
      • Execution Options
      • Execution Schedule
    • 🔗Response
    • 🔶Commands
    • 🟥Errors
  • Concept
    • Organization Structure
    • C4AI Command
    • SIC (Service Identity Code)
    • .cc4
    • 📕Glossary
  • Services
    • General Information
    • 🟨EES (Elastic Endpoint)
      • 🔶EES Commands
      • Use Cases
    • 🟨CSS Credentials Store
      • Best Practices
    • 🟨AAC (AI API Connector)
      • AAC Commands
    • 🟨AIL (AI Lambda)
    • 🟨CES (Chain Execution)
    • 🟨API Schema
    • 🟨KDB (Knowledgebase)
      • KDB Commands
    • 🟨CDB (Context Data Storage)
    • 🟨PL (Prompt Library)
      • PL Commands
    • 🟨PLPrompt (Prompt)
      • Prompt Commands
    • 🟨IDR (Intellectual Data Retrieval)
    • 🟨IDTS (Intellectual Data Transformation Service)
    • 🟨IDOS (Intellectual Data Observation Service)
    • 🟨Files
    • 🟨SJS (Scheduled Job Service )
Powered by GitBook
On this page
  • Data Storing
  • Network Security
  • Logging Policies
  • Encryption Keys
  • Security Practices
  • Data Removal

Was this helpful?

  1. Introduction

Security

Data Storing


At Cloud4.ai, we prioritize the security and confidentiality of your data. We employ stringent measures to ensure that sensitive information remains protected at all times. C4AI does not store any credentials or data in an unencrypted format.

🔐 Note: All credentials are decrypted only during execution, minimizing the risk of unauthorized access.

Network Security


Cloud4.ai adheres to industry-leading security practices, leveraging the robust infrastructure of AWS (Amazon Web Services). We implement AWS security best practices to safeguard your data throughout its lifecycle. This includes limiting access to ports, encrypting data during transfer, and implementing comprehensive network security protocols.

Logging Policies


Protecting your privacy and confidentiality is paramount to us. C4AI does not log any credentials provided or stored within our system. This ensures that sensitive information remains inaccessible to unauthorized parties and minimizes the risk of data exposure.

Encryption Keys


We prioritize data encryption as a fundamental aspect of our security framework. Each organization within Cloud4.ai is allocated unique encryption keys, ensuring the isolation and protection of data.

🔐 Note: Additionally, unique encryption keys are assigned to each record, further enhancing data security and confidentiality.

Security Practices


Cloud4.ai adheres to the highest security standards and best practices to ensure the integrity of your data. We utilize Advanced Encryption Standard (AES) with a 256-bit key length, enhancing encryption strength and resilience. In some cases, we employ 512-bit key length encryption for even greater security measures.

Data Removal


We understand the importance of data privacy and compliance. Cloud4.ai provides mechanisms for data removal upon request, enabling users to maintain control over their data and ensuring compliance with relevant regulations and policies.

PreviousOverviewNextPricing

Last updated 1 year ago

Was this helpful?

🔐 Note: Users are provided with the flexibility to choose their preferred method of credentials passing, ensuring compatibility with diverse security requirements. Read More:

CSS Best Practices