A governance-first approach to AI agent security. This document details K0nsult's infrastructure, application, data protection, and agent security controls for enterprise decision-makers.
K0nsult operates a governance-first AI agent management platform. Security is not an afterthought or an add-on -- it is embedded into every layer of our architecture, from infrastructure provisioning to agent behavior control.
Our security posture is designed to meet the expectations of enterprise CPOs, CISOs, and Security Officers who need verifiable controls before approving vendor relationships. This document provides a transparent overview of our security architecture, the controls we enforce, and the compliance frameworks we align with.
All services run on SOC2-compliant infrastructure in Frankfurt, EU. Data never leaves the European Economic Area.
Multi-layer security: JWT authentication, role-based access, rate limiting, input validation, and hardened HTTP headers.
No third-party tracking. No Google Analytics. No Facebook Pixel. We collect only what is necessary to deliver the service.
Every agent operates within defined authority boundaries. Human override is available at every level. Full audit trail for all actions.
Our infrastructure is designed for security, reliability, and regulatory compliance. All components run within the European Union.
Application-level security follows defense-in-depth principles. Multiple independent controls ensure that a failure in one layer does not compromise the system.
x-konsult-secret headeradmin, read, agentThree-tier rate limiting protects against abuse and denial-of-service attempts.
| Tier | Scope | Limit | Window |
|---|---|---|---|
| General | All API endpoints | 100 requests | 15 minutes |
| Authentication | Login, token refresh | 10 requests | 15 minutes |
| Write Operations | POST, PUT, DELETE | 30 requests | 15 minutes |
cleanText() utility before any processingAll responses include hardened security headers via Helmet.js middleware.
Access-Control-Allow-CredentialsK0nsult follows a minimal data collection principle. We collect only what is necessary to deliver the contracted service, and we do not monetize client data in any way.
All PostgreSQL data is encrypted at rest using AES-256 encryption, managed by Fly.io infrastructure. Encryption keys are rotated according to provider policy.
All data in transit is protected by TLS 1.3. Internal service-to-service communication uses WireGuard-encrypted private networking.
All data is stored and processed within the European Union (Frankfurt, Germany). Data does not leave the EEA under any circumstances.
No Google Analytics. No Facebook Pixel. No third-party tracking scripts. We do not share, sell, or monetize client data.
AI agents represent the core of K0nsult's service delivery. Agent security is therefore a first-class concern, with multiple overlapping controls to ensure safe, predictable, and auditable behavior.
K0nsult aligns its security and governance practices with major regulatory frameworks. We provide alignment support and preparation -- not formal certification.
Risk classification mapping, transparency obligations, technical documentation, and human oversight requirements. We help clients prepare for formal assessment.
Our AI management system governance is aligned with ISO 42001 principles. Gap analysis and control mapping support available for clients pursuing certification.
Privacy by design, data minimization, lawful processing, DPIA support, data subject rights handling, and 72-hour breach notification.
Adaptable governance framework that integrates with client internal policies, risk appetite, and existing GRC infrastructure.
Important Disclaimer: K0nsult provides alignment support and governance preparation. Formal compliance certification requires engagement with accredited auditors and recognized certification bodies. Our role is to help you build the evidence base, controls, and documentation needed for those assessments.
K0nsult maintains a documented incident response procedure covering detection, containment, investigation, notification, and recovery.
Security Contact: security@k0nsult.dev
For reporting security vulnerabilities or incidents. We acknowledge all reports within 24 hours.
Proactive vulnerability management is integrated into our development lifecycle. We identify, assess, and remediate vulnerabilities before they can be exploited.
npm audit runs on every CI/CD pipeline executionThese documents complement the Security Whitepaper and provide additional detail for enterprise evaluation.
Standard DPA template covering data processing terms, sub-processors, audit rights, and GDPR obligations.
Review DPASLA tiers, availability targets, response times, escalation paths, and service credit policy.
Review SLA