How Awareness keeps your data secure, private, and under your control.
Awareness is self-hosted. We never see your data. Ever.
Everything runs on your infrastructure—your servers, your cloud account, your databases. You have complete control over where your data lives and who can access it.
Your databases run on your infrastructure. PostgreSQL, MongoDB, Neo4j—all under your control.
Files stored in your S3 bucket, local filesystem, or Git repositories.
Your Awareness's memory (conversation history, learned preferences) stored in your vector database.
OAuth tokens, API keys, and database credentials encrypted and never exposed.
Your Awareness requests approval before executing dangerous operations:
Team members have different permission levels:
Each Awareness Space is completely isolated. Data from one Space cannot leak into another.
Separate PostgreSQL schemas per Space. Neo4j uses label-based namespacing. Cross-Space queries are impossible.
Separate S3 buckets or directories. Files from Space A cannot be accessed from Space B.
Your Awareness in Space A has zero knowledge of Space B. Memories and context are Space-specific.
Workflows run in separate Temporal namespaces. No workflow in one Space can trigger another.
When your Awareness uses an LLM (OpenAI, Anthropic, etc.), conversation context is sent to that provider's API.
What's sent: Your prompts, conversation history, tool outputs (database query results, file contents, etc.)
Because you self-host Awareness, you control compliance. We provide the tools; you configure them to meet your requirements.
You own all data. Right to erasure, data portability, and access are under your control. Delete a Space, and all data is gone.
Deploy on HIPAA-compliant infrastructure (AWS, GCP, Azure). Enable encryption at rest and in transit. Audit logs available.
Your deployment can meet SOC 2 requirements with proper infrastructure configuration. Audit trails built-in.
Deploy in any region. Keep EU data in EU, US data in US, etc. You choose where servers run.
Check our FAQ or review the deployment documentation for detailed security configuration.