Security

Your data. Your credentials. Your trust.
Here's exactly how we protect them.

AES-256-GCM Field Encryption

Every credential stored in OIKON — OAuth tokens, API keys, connection secrets — is encrypted with AES-256-GCM before it reaches the database. We use purpose-specific derived keys so compromising one data class cannot expose others.

Enterprise plans include Bring Your Own Key (BYOK). Revoke your key, and your data becomes permanently unreadable — even to us.

Your Data Never Trains AI Models

Before data reaches an AI provider, we redact personally identifiable information — customer names, addresses, dates — and replace them with placeholders. The AI generates responses using redacted context. We rehydrate with real data only after the response returns to our servers.

Your business intelligence stays under your control.

Every Credential Access Is Logged

Every time an OAuth token is decrypted — by a worker, a skill, or an API call — we log who accessed it, when, and why. Your credential access log is available in your portal dashboard.

Organization Boundaries at Every Layer

Every database query enforces organization-level scoping. Your data is invisible to other tenants — not through application logic alone, but through database-level security policies.

Agents access only their organization’s data. Cross-tenant access is architecturally impossible.

Saudi Arabia Data Protection

OIKON is designed for compliance with Saudi Arabia’s Personal Data Protection Law (PDPL). We implement purpose limitation, data minimization, and provide data subject access capabilities.

Enterprise customers receive a full Data Processing Agreement.

Questions about security? Contact us →