← ViberOS

Security

Last updated: March 27, 2026

ViberOS is a product of Scrini AI Private Limited. Security is foundational to our platform and this page describes our security practices.

1. Security Architecture

ViberOS is built with security at every layer. Our agentic OS implements defense-in-depth across the orchestration, evaluation, guardrail, and governance layers. Every agent action passes through security checks before execution. The platform runs in isolated containers with network segmentation between tenants.

2. Encryption

All data is encrypted at rest using AES-256 and in transit using TLS 1.3. Database encryption uses per-tenant keys managed through a hardware security module (HSM). API keys, credentials, and secrets are stored in an encrypted vault with automatic rotation policies.

3. Authentication & Access Control

ViberOS supports SSO (SAML 2.0, OIDC), MFA, and role-based access control (RBAC). Three default roles (Admin, Operator, Viewer) can be extended with custom permissions. Agent actions requiring elevated privileges trigger human-in-the-loop approval workflows.

4. Agent Security

Agents operate within strict security boundaries defined by guardrails. Each agent has a defined scope of permissions and cannot access resources outside its authorization. The orchestrator enforces least-privilege principles — agents only receive the data and tools needed for their specific task.

All agent actions are logged in immutable audit trails. Suspicious patterns trigger automatic alerts and can halt agent execution in real-time.

5. Infrastructure Security

ViberOS runs on hardened infrastructure with automated vulnerability scanning, intrusion detection, and DDoS protection. Virtual machines used for agent code execution are sandboxed and ephemeral — they are destroyed after each task. Network traffic between services is encrypted and monitored.

6. Compliance

ViberOS is designed to support compliance with SOC 2 Type II, GDPR, HIPAA, and ISO 27001 requirements. Audit logs, data residency controls, and access reports are available through the governance dashboard. We undergo annual third-party security assessments.

7. Incident Response

We maintain a 24/7 security operations team. Security incidents are classified by severity and communicated within 24 hours. Our incident response plan includes containment, investigation, remediation, and post-incident review.

8. Responsible Disclosure

If you discover a security vulnerability, please report it to security@viberos.ai. We acknowledge reports within 48 hours and provide updates on remediation progress.