Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.emergence.ai/llms.txt

Use this file to discover all available pages before exploring further.

Data Classification

CRAFT classifies all data processed by the platform into defined sensitivity levels with corresponding handling requirements. This page covers the classification taxonomy, encryption standards, and data handling policies.

Classification Levels

Level 0 — PublicData intended for public consumption. No access control required.
AttributeValue
AccessNo authentication required
Encryption at restInherits from platform default (cloud-managed AES-256)
Encryption in transitRecommended (TLS)
RetentionPer content policy
Examples: Public Agent Cards, public documentation, published API specifications, marketplace listing descriptions.

Encryption at Rest

All persistent data is encrypted at rest using industry-standard encryption:
ComponentEncryption MethodKey Management
PostgreSQLCloud-managed encryption (AES-256)Google-managed or CMEK (Cloud SQL), AWS KMS (RDS), Azure-managed (Flexible Server)
RedisCloud-managed encryption where availableProvider-managed keys
Secrets backendApplication-level secrets: Infisical (envelope encryption) or GCP Secret Manager (KMS-managed)Backend-specific key hierarchy
Object storageServer-side encryption (AES-256)Provider-managed or CMEK
Webhook secretsEnvelope encryptionPer-subscription encryption keys
Audit log PIIPer-principal encryption keysEnables crypto-shredding for RTBF

Customer-Managed Encryption Keys (CMEK)

For organizations with strict key management requirements, the platform supports CMEK on cloud-managed services:
Use Cloud KMS keys with Cloud SQL and GCS. Configure via Terraform:
resource "google_sql_database_instance" "main" {
  encryption_key_name = google_kms_crypto_key.database.id
}
Use AWS KMS keys with RDS and S3. Configure via Terraform with kms_key_id parameters.
Use Azure Key Vault keys with Azure Database for PostgreSQL. Configure via Terraform with customer-managed key references.

Encryption in Transit

All network communication is encrypted using TLS:
ChannelMinimum TLS VersionNotes
External API trafficTLS 1.3Mandatory for all client-to-platform communication
Internal service-to-serviceTLS 1.2TLS 1.3 recommended
Database connectionsTLS 1.2sslmode=require or higher
Redis connectionsTLS 1.2In-transit encryption enabled
Keycloak to IdPTLS 1.2Required for OIDC and SAML flows
Webhook deliveriesTLS 1.2HTTPS required in production environments

Mutual TLS (mTLS)

For zero-trust Kubernetes deployments, the platform supports mTLS for internal service communication via a service mesh (Istio, Linkerd).

Data Handling by Component

ComponentData HandledClassificationSpecial Handling
GovernanceOrganizations, users, rolesInternal - RestrictedPII in audit logs encrypted per-principal
AssetsArtifacts, data connections, files, modelsInternal - RestrictedCredentials stored via platform Secrets API (Infisical or ESO), never in DB
UtilsData catalog, scheduling, context packs, memoriesInternal - ConfidentialMemory content encrypted at rest; context pack metadata access-controlled
Data InsightsQuery results, SQL, visualizationsConfidentialCustomer data accessed read-only via connections
Data GovernanceProfiles, metadata, DQ rulesConfidentialMetadata derived from customer data
KeycloakUser identities, sessionsRestrictedRealm isolation, password hashing
OpenFGAAuthorization tuplesInternalNo PII, relationship data only

Data Residency

For organizations with data sovereignty requirements:
  • Region labels: Each tenant is tagged with a data residency region (EU, US, APAC, custom)
  • Geo-fenced storage: Database partitioning by region ensures data stays within designated boundaries
  • Regional endpoints: Optional per-region API routing (e.g., eu.platform.example.com)
  • Cross-region search: Federated queries can span regions with explicit opt-in; results indicate source region

Data Retention

Data TypeDefault RetentionRegulatory Override
Audit logs1 yearExtended retention where required by specific regulation (e.g., financial record-keeping). Note: HIPAA’s 6-year retention (45 CFR 164.530(j)(2)) applies to policies and documentation, not specifically to audit logs
Operational logs90 days
Session data30 days after last activity
Webhook delivery logs30 days
Data profiling resultsOrganization-defined (recommend aligning with data connection retention)Per GDPR RTBF; storage limitation principle requires justification for extended retention
Event bus (Redis Streams)7 days

Next Steps

GDPR Compliance

Learn about GDPR data handling, Right to Be Forgotten, and audit requirements.

Network Security

Review TLS configuration, SSRF protection, and network policies.

SOC 2 Controls

See how data classification maps to SOC 2 Trust Service Criteria.

Backup & Restore

Understand backup encryption and retention for disaster recovery.