Appearance
Security
This page defines the minimum security baseline for operating Aionis in production.
Baseline controls
- Never deploy production with
MEMORY_AUTH_MODE=off. - Use least-privilege credentials per environment.
- Protect admin routes with dedicated admin credentials.
- Restrict CORS to explicit trusted origins.
- Rotate keys and tokens on schedule or incident.
Secrets handling baseline
- Keep API keys, JWT secrets, and admin tokens outside source control.
- Use separate credentials for dev, staging, and production.
- Rotate secrets after incident response, not only on a calendar.
- Audit automation, worker, and replay jobs after each credential change.
Operational checks
- Confirm auth mode before each release.
- Confirm dangerous operation switches remain default-safe.
- Audit random sample of sensitive actions weekly.
Incident response readiness
- Keep request/decision/replay IDs in logs.
- Keep credential rotation runbook documented and tested.
- Preserve release artifacts for forensic analysis.
Logging and audit baseline
- Log
request_idfor every API interaction. - Log
run_idanddecision_idfor policy and tool workflows. - Log
commit_uriwhen memory writes are part of the execution path. - Keep deployment version and environment metadata with operational logs.
Review cadence
- Before each release: validate auth mode, CORS, and admin-route protection.
- Weekly: sample sensitive actions and confirm logs retain required identifiers.
- After each security incident: rotate credentials, revalidate access boundaries, and replay a critical workflow to confirm normal behavior.