Security

Security

How Skytells protects your data, infrastructure, and API access at every layer.

Security at Skytells

Skytells is designed with security at its core. Every layer of the platform — from network infrastructure to API authentication to data handling — follows defense-in-depth principles to protect your data and workloads.


Core Principles

PrincipleDescription
Zero Trust ArchitectureEvery request is authenticated and authorized regardless of origin. No implicit trust.
Data MinimizationWe collect only the data necessary to process your requests and maintain your account.
Ephemeral ProcessingPrediction inputs are not logged. Outputs are automatically purged after a short retention window.
Encryption EverywhereAll data is encrypted in transit (TLS 1.3) and at rest (AES-256).
Regional ProcessingInference workloads execute in the region closest to the request origin. Data does not cross regions.

Quick Reference

TopicSummary
Transport encryptionTLS 1.3 enforced on all API endpoints
Storage encryptionAES-256 for all data at rest
AuthenticationBearer token (API key) per request
Output retention5 minutes after prediction completion
Input loggingPrompts and inputs are never logged or stored
Training on your dataNever — Skytells does not use customer data for model training
ComplianceSOC 2 Type II, ISO 27001

How is this guide?

On this page