Security

Your data never leaves your infrastructure

Runspace deploys inside your Kubernetes cluster via a signed Helm chart. Outbound-only connectivity. No inbound access, no VPN, no Runspace staff in your environment. Credentials are AES-256-GCM encrypted and never reach the LLM.

Your Kubernetes Cluster
Browser Workers
Chromium + Agent
Backend
API + Queue
Credentials
AES-256-GCM
Outbound only
Runspace Control Plane
Health signals only
No PII · No logs
LLM API
Task instructions
No credentials
Compliance

Enterprise-grade certifications

SOC 2 Type II

Automated compliance monitoring via Vanta. Continuous control testing, not point-in-time audits. Evidence collection runs 24/7 across all trust service criteria.

ISO 27001:2022

Information security management aligned to international standards. Vanta-managed evidence collection ensures continuous compliance without manual overhead.

Zero PII Exposure

No customer data, credentials, or PII ever reaches Runspace servers or LLM providers. Everything stays inside your cluster, under your control.

Supply Chain Security

Signed OCI images with full SBOM. Verified provenance for every component deployed to your infrastructure. No unaudited dependencies.

Design Principles

Security by architecture, not by policy

01

Outbound-only connectivity

No inbound access, no VPN, no Runspace staff in your environment. Your cluster initiates all connections. Nothing reaches in.

02

Credential isolation

AES-256-GCM encrypted credentials injected at runtime. Never stored in plaintext, never sent to LLMs, never accessible outside the agent session.

03

Full audit trail

Every agent action is logged with timestamps, screenshots, and step-by-step traces. Complete visibility for compliance review and incident investigation.

04

Tenant isolation

Each agent session runs in an isolated browser context. No shared state, no cross-session data leakage, no persistent local storage between runs.

05

Continuous monitoring

Vanta provides real-time compliance monitoring, automated evidence collection, and audit-ready reports. No manual spreadsheets, no annual fire drills.

Questions about our security posture?

We're happy to walk through our architecture, share compliance documentation, or connect you with our security team.