Skip to content

Security#

How Lens Agents protects enterprise systems from compromised or malicious agents. Architecture, compliance, privacy, and regulatory alignment.

  • Security model


    Threat model, trust boundaries, and what the platform is honest about.

  • Whitepaper


    Full technical security whitepaper — architecture, controls, and guarantees.

  • Compliance


    The Mirantis compliance framework Lens Agents inherits, plus security practices and attestation availability.

  • Privacy


    Data handling, PII controls, and what leaves your environment.

  • Data sovereignty


    Where data lives — SaaS regions, self-hosted, and the cloud marketplace.

  • Security operations


    Internal access, incident response, key management, backups, SLAs — what's public and what's shared under NDA during evaluation.

  • EU AI Act


    How Lens Agents helps meet EU AI Act requirements.


Security review, under NDA

Security reviews during evaluation are direct, technical, and specific to your deployment model. Internal access controls, SLAs, key management, data retention, pen test results, and the Lens SOC 2 attestation letter are covered under NDA. Talk to us when you're ready — Security operations lists what's public vs. what's shared during engagement.