SECURITY
AT MAEDO
Security is not an afterthought; it is the foundation of autonomy. We build systems that are secure by design, ensuring your data is protected at every step.
SOC 2 Type II
We are fully compliant with SOC 2 Type II standards, verified by independent auditors to ensure our security controls are effective.
End-to-End Encryption
All data is encrypted in transit using TLS 1.3 and at rest using AES-256. Your sensitive information is never exposed.
Data Sovereignty
For enterprise clients, we offer data residency options to ensure your data stays within your required legal jurisdiction.
Isolated Environments
We utilize single-tenant architecture for enterprise deployments, ensuring complete isolation of your compute and data resources.
Cloud Fortress
Our infrastructure is hosted on AWS, utilizing rigorous network security controls, VPC isolation, and continuous threat monitoring. Access to production systems is restricted to authorized personnel via hardware MFA.
- Auto-scaling VPC Isolation
- DDoS Protection (Layer 7)
- Hardware-based MFA
- Real-time Audit Logging
Code Integrity
We perform regular penetration testing and code reviews. Our agents are sandboxed, preventing unauthorized access to external tools or data. You define the exact permissions for every tool an agent can use.
- Agent Runtime Sandboxing
- RBAC Tool Permissions
- Regular Pentesting
- AES-256 Memory Encryption