Security and controls

The workflow only becomes buyable when the trust model is visible before launch.

Buyers do not need vague reassurances. They need a clear rollout posture: what starts read-only, what gets scoped write access later, what stays human, how the action history is logged, and how your data is handled at every step.

One-sentence answer

Read-only discovery first, workflow-specific access later, human-owned exceptions, and a control review before launch.

Control posture

Four controls every workflow ships with.

Read-only first

Every engagement starts with read-only system access. We map the workflow, owners, and exception classes before any production write is requested.

Scoped write access

When production writes are needed, they are limited to the specific actions required for the completed unit of work — never broad account-wide permissions.

Humans on exceptions

Ambiguity, threshold breaches, and high-risk cases surface to named humans with evidence attached. The workflow never tries to auto-resolve what it shouldn't touch.

Workflow action history

Key workflow actions, approvals, and exception handoffs are documented so reviews have a clear record of what happened.

Security review topics

What the review actually covers.

No vague “enterprise-grade” claims. These are the topics we define with buyers before launch.

Workflow-specific access review

Access is designed per workflow, reviewed with the customer team, and approved before any production action is enabled.

Data minimization

We focus the workflow on the fields and system actions it actually needs instead of asking for broad access by default.

Environment and hosting review

Deployment pattern, data flow, and any customer-environment constraints are discussed during evaluation and documented before launch.

Logging and traceability

The workflow records the events and approvals your team needs to review operational decisions and exception handling.

Operational response path

Pause, notification, and review steps are defined for unexpected behavior before production use.

Commercial and privacy review

Security questionnaires, privacy terms, and related diligence materials are handled during the evaluation and contracting process for the specific workflow.

What we document during evaluation

What belongs in the buyer review process.

We would rather narrow the public claims and document the specifics during evaluation than make broad promises on the site.

Current certification status
Confirm during evaluation

This page does not represent TryAgent as SOC 2 certified. Buyers who need a point-in-time certification answer should confirm the current status directly during evaluation.

Privacy and contract materials
Shared as applicable

Security questionnaires, privacy terms, and related diligence materials are discussed during the deal process for the specific workflow and deployment scope.

Deployment constraints
Defined per engagement

Hosting, data residency, and system-access constraints are evaluated per workflow rather than promised generically on the public site.

Control design
Documented before launch

The access model, human approvals, action history, and escalation path are written down before production work begins.

Questions buyers ask

Trust questions belong on the site, not buried in a follow-up email.

Why start read-only?

Because the first job is understanding the process, not acting inside it. Read-only discovery reduces security friction and produces a defensible rollout plan your security team can actually evaluate.

How do you decide what can auto-complete?

Only the straight-through work with clear rules and low ambiguity. High-risk or unclear states stay in a human queue with context and evidence attached. You set the thresholds during scoping.

What should the workflow history include?

Workflow state, input source, rule or threshold that fired, action taken, timestamp, and the person who approved it when human review was required.

Are you SOC 2 certified today?

This page does not claim current SOC 2 certification. If certification status matters to your buying process, confirm the current answer directly during evaluation.

How do you handle credentials for our systems?

The access method, credential scope, and review process are defined during technical scoping before production permissions are enabled.

What happens if a workflow takes an action it shouldn't?

The response path is defined during scoping: pause the workflow, review the action history, notify the workflow owner, and decide remediation before resuming.

How can we contact your security team?

Use the security contact path provided during evaluation or email security@tryagent.ai.

Contact

Reach the security team directly.

For security diligence questions, responsible-disclosure reports, or suspected incidents.

Need the controls story tied to one real workflow?

We can map the straight-through path, define the exception queue, and show exactly what stays read-only, what would be scoped later, and how the workflow history would work.