Skip to main content
Version: 2.0

Security

Secure your Vectara applications with enterprise-grade authentication, authorization, and data privacy controls. This section covers how to authenticate API access, control user permissions, and ensure compliance with security standards.

Authentication

Secure your API access with API keys or OAuth 2.0:

Authorization

Control access to your Vectara resources with fine-grained permissions:

Data Privacy and Compliance

Vectara is built for enterprise security and compliance requirements:


Security Features

Vectara provides enterprise-grade security:

  • SOC 2 Type II certified - Independently audited security controls
  • HIPAA compliant - Healthcare data protection standards
  • Zero training on customer data - Your data stays private and is never used for model training
  • Encryption at rest and in transit - AES-256 and TLS 1.2+
  • Fine-grained access control - RBAC and ABAC support
  • Audit logging - Complete activity trails for compliance
  • Multi-tenant isolation - Secure data separation between customers