Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.abundly.ai/llms.txt

Use this file to discover all available pages before exploring further.

Abundly is built on enterprise-grade cloud infrastructure with security and compliance at its foundation. All data is stored in EU data centers, encrypted at rest and in transit, and protected by comprehensive access controls. This page provides the technical details enterprise security teams need.

Data residency

All customer data is stored in EU data centers, specifically in Stockholm, Sweden:
ComponentLocation
DatabaseAWS eu-north-1 (Stockholm)
Agent ServiceGCP europe-north2 (Stockholm)
File StorageGCP europe-north2 (Stockholm)
Task QueueGCP europe-north2 (Stockholm)
EU data residency ensures compliance with GDPR and other European data protection regulations. Data does not leave the EU.

Encryption

TypeStandard
At restAES-256 encryption for all stored data
In transitTLS 1.2+ / HTTPS for all communication
SecretsRSA-OAEP with SHA-256 (see Credentials)
All communication between components is encrypted. HTTPS is enforced for all endpoints.

Web and API transport hardening

In addition to TLS encryption, Abundly uses security headers across the web portal and API surfaces to reduce browser-based attack risk.
SurfaceHeader strategySecurity goal
Web portalStrict browser headers including Content Security Policy (CSP), frame protections, permissions policy, referrer policy, and MIME-type protectionsReduce XSS and clickjacking risk, restrict browser features, and limit data leakage
User app rendererServed from a separate usercontent subdomain with its own CSP profile that allows the embedding and external assets needed by user-generated appsIsolate untrusted user-generated content from the main app via cross-origin sandboxing
Agent service APIAPI-focused hardening headers (HSTS and related Helmet protections) for non-HTML responsesEnforce HTTPS and protect API consumers from common browser-side header attacks
CSP is applied on web responses where script and content execution rules matter. API endpoints focus on transport and response hardening headers.

User-generated content isolation

Interactive Apps and HTML documents created by agents can contain arbitrary code. To prevent this code from accessing the main application or its session, the platform serves all rendered user content from a dedicated usercontent.abundly.ai subdomain that is separate from the main app.abundly.ai domain. Because the browser treats these as different origins, code running inside an embedded app is fully sandboxed by the browser’s same-origin policy: it cannot read cookies, local storage, or the DOM of the main app, even when displayed inside it. The main app domain refuses to serve the renderer, and the usercontent domain refuses to serve anything else, so the boundary cannot be bypassed by linking or redirecting.

Compliance status

StandardStatusNotes
GDPRCompliantEU data residency in Stockholm
Data EncryptionMetAES-256 at rest, TLS 1.2+ in transit
Access ControlsComprehensiveRole-based permissions
SOC 2 Type IIPlannedCertification in progress
ISO 27001EvaluationUnder consideration

Audit trails

Every agent action is logged with complete context:
FieldDescription
TimestampWhen the action occurred
ActorWhich agent performed the action
TriggerWhat initiated the action (email, schedule, chat, etc.)
PlanWhat the agent intended to do
ExecutionWhat tools were called and what happened
ResultThe outcome of the action
Audit logs are immutable and cannot be modified or deleted after creation.
You can access audit information through:
  • Activity log — Real-time and historical view of agent actions with full details
  • Agent diary — High-level summary of what each agent has been doing
See Activity Monitoring for details on using these tools.

Data retention

Data TypeRetention
Account InformationWhile account active; deleted within 30 days of account deletion
User ContentRetained to provide services; deleted within 30 days after deletion
Log DataUp to 90 days for security and troubleshooting
Usage DataAnonymized data may be retained for analytics
BackupsData may remain in backups up to 9 months

System architecture

The platform is built on cloud-native infrastructure:
ComponentTechnologyLocation
Web PortalVercel, Next.js/ReactVercel Edge Network
Agent ServiceGoogle Cloud Run, Node.jsGCP europe-north2
DatabaseMongoDB AtlasAWS eu-north-1
Task QueueGoogle Cloud TasksGCP europe-north2
File StorageGoogle Cloud StorageGCP europe-north2

Availability and disaster recovery

FeatureImplementation
Cloud-native resilienceAutomatic failover via Vercel and GCP
Automated backupsDaily with point-in-time recovery
Backup retention9 months with cross-region replication
Health monitoringContinuous monitoring with alerting
RTO (Recovery Time)24 hours for critical services
We maintain a documented Disaster Recovery Plan covering database recovery, secrets restoration, and service continuity.

Security monitoring

ActivityApproach
Infrastructure monitoringAutomated via GCP, MongoDB Atlas, Vercel
Alert configurationEmail notifications to technical team
Active monitoringDaily dashboard review
Incident responseCritical alerts within 1 hour (business hours)
Penetration testingAnnual third-party testing

Privacy Policy

How we collect and use data

Terms of Service

Service agreement and terms

Data Processing Agreement

DPA for enterprise customers

Sub-processors

List of third-party data processors

Enterprise compliance

For enterprise customers, we can provide:
  • Custom data retention policies
  • Dedicated compliance documentation
  • Audit support and reports
  • Custom DPA terms

Contact Us

Need custom compliance arrangements? Contact our team.