Security

Last Updated: January 16, 2026

Security is Non-Negotiable: MemoryGate stores your AI's memory—the most sensitive data in your stack. We've built every layer with security as the default, not an afterthought.

1. Data Encryption

Encryption at Rest AES-256

All data stored in PostgreSQL is encrypted using AES-256-GCM. This includes:

  • Memory observations
  • Knowledge graphs
  • Embeddings
  • Metadata and audit logs

Encryption in Transit TLS 1.3

All API traffic uses TLS 1.3 with perfect forward secrecy:

  • HTTPS enforced (no downgrade)
  • HSTS headers enabled
  • Certificate pinning recommended

2. Authentication & Access Control

OAuth 2.0 with PKCE RFC 7636

MemoryGate uses industry-standard OAuth 2.0 with Proof Key for Code Exchange (PKCE) to prevent authorization code interception attacks.

API Key Security

For programmatic access, API keys are:

Role-Based Access Control (RBAC)

Every user has a role with specific permissions:

3. Multi-Tenant Isolation

Database-Level Isolation RLS

Every table uses PostgreSQL Row-Level Security (RLS) policies to enforce strict tenant isolation:

Schema Design

Our schema includes:

4. Infrastructure Security

Hosting & Network

MemoryGate runs on Fly.io infrastructure:

Database Security

PostgreSQL configuration follows CIS benchmarks:

5. Application Security

Input Validation

All API inputs are validated:

Rate Limiting

API endpoints are rate-limited by:

Security Headers

All HTTP responses include:

6. Monitoring & Audit

Audit Logs

All significant actions are logged:

Audit logs are:

Real-Time Monitoring

We monitor for:

7. Backups & Disaster Recovery

Point-in-Time Recovery (PITR)

High Availability

8. Vulnerability Management

Security Updates

We apply security patches:

Dependency Scanning

All dependencies are scanned for known vulnerabilities:

9. Responsible Disclosure

Security Bug Bounty

Found a security issue? We want to hear about it.

What We'll Do

  1. Acknowledge your report within 48 hours
  2. Investigate and confirm the issue
  3. Develop and test a fix
  4. Deploy the fix (coordinated disclosure)
  5. Credit you in our security acknowledgments (if you want)

What Not to Do

10. Compliance & Certifications

Current Status

Data Residency

All data is currently stored in Virginia, USA (via Fly.io infrastructure). Additional regions planned for future deployment.

11. Open Source Transparency

MemoryGate Core is fully open source (Apache 2.0). You can:

12. Contact Security Team

Questions, concerns, or reports? Reach out: