Cyberdesk is built to protect customer data, limit unnecessary data exposure, handle sensitive inputs with stronger controls, and support a modern SaaS security posture across infrastructure, automation, and AI workflows.
For current trust materials, security documentation, and compliance status, visit our Trust Center. You can also review our public badges below.
We follow a data-minimization approach and maintain defined retention policies by data type so information is kept only as long as needed for service delivery, support, reliability, and legal obligations.
Cyberdesk protects customer data with encrypted transport and encryption at rest, alongside access controls and infrastructure hardening.
For highly sensitive data, we use multiple layers of security, including Basis Theory-backed vaulting so secrets are handled separately from normal workflow data.
Our policy is to prefer zero-data-retention configurations with LLM vendors where supported, while keeping the most sensitive secret classes out of model traffic entirely.
Cyberdesk is designed around data minimization. We aim to collect and retain only the information needed to operate the product, support customers, maintain reliability, and satisfy legal or contractual obligations.
We maintain retention policies by data class rather than treating all data the same. That means operational data, logs, workflow artifacts, and highly sensitive inputs are handled with different controls and lifecycles based on risk and business need.
Cyberdesk protects data both in transit and at rest. Encrypted connections are used for service communication, and stored platform data is protected with encryption at rest together with access restrictions and credential controls.
We complement encryption with service-level authorization, environment separation, least-privilege access, and infrastructure hardening so that security does not depend on any single control alone.
For passwords, API keys, and other highly sensitive values, Cyberdesk uses multiple layers of security rather than treating those inputs like standard workflow data. Sensitive values are stored in a secure third-party secret vault powered by Basis Theory.
Those values are handled separately from ordinary inputs, are not broadly exposed across the platform, and are resolved only at the last possible moment during actual computer actions such as typing into a target application.
Cyberdesk uses AI to power automation, but our security design separates secret handling from model interactions. The most sensitive secret classes do not need to be sent to LLMs at all.
For model traffic more broadly, our policy is to prefer zero-data-retention configurations with LLM vendors where the provider and workload support it. We also aim to keep model inputs scoped to the minimum necessary for the requested task.
We isolate access to Supabase-backed systems and limit direct exposure of underlying infrastructure wherever practical. Access to data stores and supporting services is intended to flow through approved service paths rather than broad public entry points.
As part of that model, Cyberdesk restricts database and infrastructure access with network boundaries, service controls, and IP-based restrictions where applicable. The goal is to narrow the set of systems and addresses that can reach sensitive backing services.
Security is an ongoing operating function, not a one-time setup task. We monitor core systems for availability and security issues, investigate anomalies, and continue to improve controls over time.
Customers who need additional diligence materials can use our Trust Center, and current operational health is available on our public status page.
If you need more detail on Cyberdesk's security program, would like to review documentation, or want to discuss a specific compliance or architecture requirement, contact mahmoud@cyberdesk.io.