At Digital Expression, security, privacy, and responsible data handling are foundational principles behind ACE. This document outlines how ACE manages data, ensures compliance, and protects sensitive information in enterprise environments.
- Privacy by Design: ACE is built to minimize exposure of source code and sensitive data.
- Least Privilege Access: All services and data flows operate under minimal permissions.
- Zero Trust Model: Every interaction and component is validated and scoped.
- No Self-Hosting: Ensures continuous updates, vulnerability patches, and LLM improvements by maintaining a single, secured cloud infrastructure.
- System Sandboxing: ACE runs commands within secure OS-level sandboxes:
- π₯οΈ On macOS: using App Sandbox
- π§ On Linux: using Landlock LSM
- π File system access is restricted to the current working directory only
- Code analysis is performed locally by default.
- Only metadata, context embeddings, or summaries may be sent remotely.
- No raw source code is uploaded without explicit developer consent.
- Embeddings are generated from local context to enable Retrieval-Augmented Generation (RAG).
- Stored in an encrypted database with industry-standard encryption (AES-256).
- Data is segmented by project and client to prevent cross-access.
- Document DB: For structured project and metadata
- Vector DB: For fast, semantic retrieval and similarity search
- Graph DB: For mapping relationships across modules and knowledge entries
- Embeddings and context are retained only as long as needed to support developer workflows.
- Data can be automatically expired or purged upon request.
- Temporary memory-based caching can be disabled for strict runtime-only usage.
- β ISO 9001:2015 β Quality Management
- β ISO 20000-1:2018 β IT Service Management
- β ISO/IEC 27001:2022 β Information Security
- β All vendors used are ISO/IEC 27001 or SOC 2 Type 2 certified
- β Fully GDPR compliant infrastructure and processes
- Audit Logs: Optionally record access, queries, and code context usage
- Integration: Logs can be sent to your internal monitoring or SIEM platform
- Audit Availability: Full audit trail can be made available on request
- Developers and teams control what data is included in context and embedding generation
- Filters and exclusion rules can be set in
.aceconfigor CLI - No external transmission happens without developer or admin-level opt-in
For detailed security review, audits, or custom data retention policies, please contact:
π§ info@digitalexpression.ro π https://digitalexpression.ro