Skip to main content

Security

VaultProxy is designed with a Zero Trust architecture. Every component assumes that other components may be compromised, and security controls are applied at every layer.

Architecture Overview

┌─────────────┐    TLS 1.3     ┌───────────────────────────────┐    TLS 1.3    ┌──────────────┐
│ Your App │ ──────────────> │ VaultProxy │ ─────────────> │ AI Provider │
│ │ <────────────── │ ┌─────────┐ ┌───────────┐ │ <───────────── │ (OpenAI etc) │
└─────────────┘ │ │ PII │ │ Routing │ │ └──────────────┘
│ │ Engine │ │ Engine │ │
│ └─────────┘ └───────────┘ │
│ ┌─────────┐ ┌───────────┐ │
│ │ Auth │ │ Usage │ │
│ │ Layer │ │ Tracking │ │
│ └─────────┘ └───────────┘ │
└───────────────────────────────┘
EU Data Center

Data Flow Security

Prompts and Responses

  1. In transit -- All connections use TLS 1.3. VaultProxy terminates TLS at the edge and re-encrypts when forwarding to AI providers.
  2. PII processing -- PII detection and anonymization happen entirely in RAM. No prompt content is ever written to disk.
  3. Temporary retention -- Original PII values are held in memory for up to 60 seconds during request processing, then discarded.
  4. No content logging -- VaultProxy never logs, stores, or caches the content of prompts or AI responses. Only metadata (token counts, model used, timestamps, PII type counts) is persisted.

Provider Keys

  • Encrypted at rest using AES-256-GCM
  • Encryption keys are stored in a separate key management service, never in the application database
  • Decrypted only in memory at the moment of forwarding a request to the upstream provider
  • Immediately discarded after use

VaultProxy API Keys

  • Stored as bcrypt hashes -- the plain-text key is never stored
  • Keys follow the vpx_live_ / vpx_test_ prefix convention for easy identification
  • Revocation takes effect immediately

EU Hosting

All VaultProxy infrastructure is hosted within the European Union:

  • Application servers: EU data centers
  • Database: EU-hosted PostgreSQL with encryption at rest
  • No data replication outside the EU
  • All processing occurs within EU jurisdiction
info

When VaultProxy forwards a request to an AI provider, that provider's data processing policies apply. For example, if you use OpenAI, your (anonymized) prompt is processed according to OpenAI's data use policy. VaultProxy ensures PII is removed before this happens.

RODO / GDPR Compliance

VaultProxy supports organizations in meeting their RODO/GDPR obligations:

RequirementHow VaultProxy Helps
Data minimization (Art. 5(1)(c))PII is stripped before forwarding to AI providers, minimizing data exposure
Purpose limitation (Art. 5(1)(b))Provider keys and settings are scoped per use case
Storage limitation (Art. 5(1)(e))PII is held in RAM for max 60 seconds; no persistent storage of personal data
Integrity and confidentiality (Art. 5(1)(f))AES-256 encryption, TLS 1.3, zero content logging
Special categories (Art. 9)Art. 9 data detection and flagging/blocking
Data processing agreementDPA available for Enterprise customers

Data Processing Agreement (DPA)

Enterprise customers receive a Data Processing Agreement that covers:

  • Nature and purpose of processing
  • Types of personal data processed
  • Categories of data subjects
  • Sub-processor list
  • Data breach notification procedures
  • Data deletion upon contract termination

Contact [email protected] for DPA requests.

What VaultProxy Does NOT Store

To be explicit about data handling:

DataStored?Details
Prompt contentNoProcessed in RAM only
AI responsesNoStreamed through, not persisted
Original PII valuesNoHeld in RAM for max 60s
Provider API keys (plain text)NoOnly AES-256 encrypted form
VaultProxy API keys (plain text)NoOnly bcrypt hashes
Request metadataYesTimestamps, token counts, model, PII type counts
Usage statisticsYesAggregated daily/monthly metrics

Incident Response

VaultProxy maintains an incident response procedure:

  1. Detection -- Automated monitoring and alerting for anomalous patterns
  2. Containment -- Affected systems are isolated within 30 minutes
  3. Notification -- Customers are notified within 72 hours per RODO Art. 33 requirements
  4. Resolution -- Root cause analysis and remediation
  5. Post-mortem -- Published to affected customers

Reporting Vulnerabilities

If you discover a security vulnerability, please report it responsibly:

  • Email: [email protected]
  • We acknowledge reports within 24 hours
  • We aim to resolve critical issues within 48 hours