Security at MemoryRouter
Memory is sensitive data. Everything a user tells their agent flows through us. Here's exactly how we handle it — no marketing fluff, just the facts.
Data isolation
Every MemoryRouter customer, and every one of their end users, gets their own isolated memory vault. Vaults are scoped at the retrieval layer — there is no shared index where a bad query could surface another tenant's memory.
- One API key = one vault. No cross-tenant retrieval paths.
- Programmatic key provisioning lets enterprises mint a fresh vault for every end user.
- Deletion is hard-delete at the vault level — not a soft flag.
Encryption
Memory data is encrypted in transit and at rest.
- In transit: TLS 1.2+ on every endpoint. HSTS enforced.
- At rest: AES-256 encryption on vault storage and backups.
- Secrets: API keys are hashed before storage; we never store plaintext keys.
Access controls
- Scoped API keys — rotate or revoke any key without touching the rest.
- Admin keys (for programmatic provisioning) are separate from per-customer keys.
- Internal access to production is limited to a small engineering team. Least-privilege by default.
- 2FA required on all administrative accounts.
- Audit logs on key mutations (create / rotate / revoke / delete).
Compliance roadmap
We're being honest about where we are versus where we're going. No fake badges.
Target: Q3 2026. Controls implemented; currently in observation window.
Data Processing Agreements available on request for all customers.
On the Enterprise tier — specify the region your vaults live in.
Reach out if you have specific compliance questions for your vertical.
Incident response
We monitor production 24/7 via automated alerting. In the event of a security incident affecting customer data:
- Affected enterprise customers are notified within 72 hours (or sooner when required by contract).
- Post-mortem published to impacted accounts with root cause and remediation.
- Security issues can be reported privately to [email protected].
Security questions?
Security reports, compliance questionnaires, DPA requests — send them our way.
[email protected]Buying for your team? See our enterprise offering →