Security

Version

1.0

Feb 25, 2025

Infrastructure Security

Sentient Labs’ production environment is deployed on Google Cloud Platform (GCP), following industry-leading security best practices. This includes network segmentation, perimeter defense mechanisms, web application firewalls (WAF), and continuous vulnerability assessment and management (VA/VM). Our infrastructure is designed for high availability, resilience, and robust threat mitigation to safeguard sensitive data and operations.

Data Protection

We implement strong cryptographic controls for data processing and storage, adhering to NIST-approved algorithms and key lengths.

  • Data in transit is encrypted using TLS 1.2 or higher to prevent unauthorized access.

  • Data at rest is protected using AES-256 encryption, ensuring confidentiality and integrity.

Sentient Labs continuously monitors encryption standards and upgrades protocols as needed to maintain compliance with evolving security regulations.

Access Control

We enforce strict access controls across all production environments:

  • Comprehensive audit logging captures authentication events, system modifications, and other security-relevant activities.

  • Federated identity management with Multi-Factor Authentication (MFA) ensures secure access for authorized personnel.

  • The Principle of Least Privilege (PoLP) is enforced through Role-Based Access Control (RBAC), minimizing exposure to sensitive data and reducing risk.

We encourage security researchers to report any identified vulnerabilities responsibly by contacting support@sentientlabs.io.

Infrastructure Security

Sentient Labs’ production environment is deployed on Google Cloud Platform (GCP), following industry-leading security best practices. This includes network segmentation, perimeter defense mechanisms, web application firewalls (WAF), and continuous vulnerability assessment and management (VA/VM). Our infrastructure is designed for high availability, resilience, and robust threat mitigation to safeguard sensitive data and operations.

Data Protection

We implement strong cryptographic controls for data processing and storage, adhering to NIST-approved algorithms and key lengths.

  • Data in transit is encrypted using TLS 1.2 or higher to prevent unauthorized access.

  • Data at rest is protected using AES-256 encryption, ensuring confidentiality and integrity.

Sentient Labs continuously monitors encryption standards and upgrades protocols as needed to maintain compliance with evolving security regulations.

Access Control

We enforce strict access controls across all production environments:

  • Comprehensive audit logging captures authentication events, system modifications, and other security-relevant activities.

  • Federated identity management with Multi-Factor Authentication (MFA) ensures secure access for authorized personnel.

  • The Principle of Least Privilege (PoLP) is enforced through Role-Based Access Control (RBAC), minimizing exposure to sensitive data and reducing risk.

We encourage security researchers to report any identified vulnerabilities responsibly by contacting support@sentientlabs.io.

Infrastructure Security

Sentient Labs’ production environment is deployed on Google Cloud Platform (GCP), following industry-leading security best practices. This includes network segmentation, perimeter defense mechanisms, web application firewalls (WAF), and continuous vulnerability assessment and management (VA/VM). Our infrastructure is designed for high availability, resilience, and robust threat mitigation to safeguard sensitive data and operations.

Data Protection

We implement strong cryptographic controls for data processing and storage, adhering to NIST-approved algorithms and key lengths.

  • Data in transit is encrypted using TLS 1.2 or higher to prevent unauthorized access.

  • Data at rest is protected using AES-256 encryption, ensuring confidentiality and integrity.

Sentient Labs continuously monitors encryption standards and upgrades protocols as needed to maintain compliance with evolving security regulations.

Access Control

We enforce strict access controls across all production environments:

  • Comprehensive audit logging captures authentication events, system modifications, and other security-relevant activities.

  • Federated identity management with Multi-Factor Authentication (MFA) ensures secure access for authorized personnel.

  • The Principle of Least Privilege (PoLP) is enforced through Role-Based Access Control (RBAC), minimizing exposure to sensitive data and reducing risk.

We encourage security researchers to report any identified vulnerabilities responsibly by contacting support@sentientlabs.io.