Policy

Security Overview

Last updated November 11, 2024

Round Table AI supports engineers, researchers, and leadership teams who need reliable, confidential AI conversations. Security is layered throughout our stack.

Infrastructure

  • AWS Foundation: We run inside VPC-isolated AWS accounts with private subnets for databases and compute workloads.
  • Edge Protection: CloudFront with Origin Access Control fronts every static asset, while AWS WAF blocks common attack patterns and enforces rate limits before they hit the origin.
  • Infrastructure as Code: The marketing site lives inside AWS Amplify (CloudFront + Lambda@Edge), while the chat app uses Terraform-managed services. Everything passes through Git-based reviews before deploy.

Application Security

  • Secrets Management: AI provider credentials, Stripe keys, and JWT signing keys live in AWS Secrets Manager. Applications assume IAM roles that grant scoped, auditable access.
  • Least Privilege: Service roles are scoped to the exact S3 buckets, queues, or databases they require.
  • Input Sanitization: Conversation transcripts are normalized before being replayed to providers, preventing prompt injection across agents.
  • Offline-Safe Runs: Every agent completion is queued and persisted before dispatching to providers, preserving a tamper-proof audit trail.

Data Protection

  • Encryption: TLS 1.2+ in transit and AES-256 at rest via managed KMS keys.
  • Database: Aurora PostgreSQL stores conversations, usage metrics, and billing state. Automated multi-AZ backups run nightly.
  • Token Accounting: Platform token calculations preserve the raw provider usage for finance exports, while exposing rounded totals to end users.

Monitoring & Response

  • Observability: Structured logs, application metrics, and conversation events stream to CloudWatch. Alerts trigger on latency spikes, token anomalies, and WAF rule hits.
  • Incident Response: On-call engineers triage incidents with documented playbooks. Critical issues are communicated through the status page and in-app banners.
  • Vulnerability Management: Dependency updates and security patches flow through automated Dependabot + CI pipelines. High-severity issues receive expedited releases.

Customer Responsibilities

  • Maintain strong passwords or SSO enforcement for every user.
  • Limit access to sensitive conversations and export data responsibly.
  • Report suspected vulnerabilities to security@round-table.ai. We respond within one business day.

Security is a shared responsibility. We welcome audits, questionnaires, and diligence requests from prospective customers—reach out via sales@round-table.ai to begin the process.