High-level security guidance for teams deploying CortexDB in controlled environments.
Enterprise Security
Security for CortexDB should be planned the same way you plan security for other stateful application infrastructure: around identity, network boundaries, storage controls, auditing, and operational responsibility.
This page focuses on those deployment considerations at a public, high level.
Authentication and access
Applications typically authenticate to CortexDB using bearer credentials.
curl https://your-cortexdb/v1/recall \
-H "Authorization: Bearer your-api-key"
For production use, teams should define:
- how application credentials are issued and rotated
- which services and operators are allowed to access CortexDB
- how tenant, workspace, or environment boundaries are enforced in application use
Encryption and transport protection
Self-hosted deployments should follow your organization’s standards for:
- encrypting sensitive data according to policy
- protecting secrets and service credentials
- terminating TLS or applying network-layer encryption
- restricting access to trusted networks and workloads
Tenant governance
Many teams use CortexDB in multi-tenant or multi-workspace environments.
In those cases, security planning should include:
- clear tenant scoping in applications and integrations
- environment separation for development, staging, and production
- least-privilege access for services that read or write memory
- review paths for retention, deletion, and data handling requirements
Auditability
Production deployments should make memory operations observable and reviewable.
That usually means capturing:
- who or what system accessed the service
- what action was performed
- which tenant or workspace was affected
- whether the operation succeeded or failed
See Audit Trail for the broader governance view.
Compliance planning
If you are operating in a regulated environment, CortexDB should be deployed as part of your broader compliance program rather than as a standalone exception.
Typical topics to review include:
- data residency requirements
- retention and deletion policies
- incident response and audit evidence
- vendor and provider controls when external AI services are used
Shared responsibility
Security posture depends on deployment model.
- In managed environments, focus on application identity, access, and usage policy.
- In self-hosted environments, also plan for networking, secrets, storage, monitoring, backups, and operator procedures.