Integrating external AI models and data sources via platforms like the Mpalo Workbench offers significant advantages for building sophisticated applications with enhanced memory and processing. However, this integration means Mpalo often serves as an intelligent conduit, interacting directly with your proprietary APIs and data. Consequently, maintaining the highest level of security for these connections isn't just important — it's fundamental. This guide details Mpalo's security architecture for these integrations and provides actionable steps for ensuring your setup is robust and secure.
The Critical Need for Secure Connections
When you connect external systems through Mpalo Workbench, you're entrusting us with access points to potentially sensitive assets. Understanding the risks involved underscores the need for meticulous security:
- API Key Exposure: Leaked API keys are like handing over the keys to your digital kingdom. Unauthorized parties could misuse your AI models (leading to unexpected costs), access or modify your services, or gain deeper footholds into your infrastructure.
- Data Interception: Information flowing between Mpalo and your systems, if not properly encrypted, could be intercepted (eavesdropped) by malicious actors, revealing sensitive business logic, user data, or proprietary information.
- Vector Data Breaches: Embeddings in vector stores often represent distilled knowledge from private documents or user data. Unauthorized access could lead to intellectual property theft, privacy violations (potentially breaching GDPR, CCPA, etc.), or loss of competitive advantage.
- Service Disruption & Misuse: Compromised connections could allow attackers to disrupt your services or use your paid API resources fraudulently.
- Reputational Damage: A security incident involving customer data or critical systems can severely damage user trust and brand reputation.
At Mpalo, we architect our platform defensively, but effective security relies on both our diligence and yours. A clear understanding of responsibilities is vital.

Mpalo's Security Architecture for Integrations
We employ multiple layers of security to protect the connections you configure in Workbench:
1. Rigorous API Key Protection
Your external service API keys are treated as highly sensitive credentials:
- Transit Encryption: All key submissions and subsequent uses happen exclusively over channels encrypted with industry-standard TLS 1.2 or higher (HTTPS).
- At-Rest Encryption: Keys stored within our system are encrypted using strong algorithms (e.g., AES-256) before being persisted in our secure configuration database.
- Strict Access Control: Internal access to decrypted keys is programmatically restricted only to the specific, authorized microservices that require them to fulfill your API requests. Human access is heavily audited and restricted.
- No Plaintext Logging: Sensitive credentials like API keys are never written to application logs in an unencrypted format.
Crucially, remember that Mpalo uses the API keys *you* provide for *your* external services. We do not generate or manage keys for those third-party systems.
2. Universal Transport Layer Security (TLS)
Every network communication involving the Mpalo platform – from your browser to our frontend, between our internal services, and from our backend to your configured API endpoints and vector stores – is mandated to use strong HTTPS (TLS) encryption. This ensures data confidentiality and integrity during transit, protecting against eavesdropping and tampering.
3. Secure Interaction with External Vector Stores
Data sovereignty and control are paramount. Our integration model reflects this:
- User Ownership: You select, provision, and manage your own vector store instance (e.g., Pinecone, Weaviate, Qdrant). You control its data, region, access policies, and lifecycle.
- Secure Credential Handling: You provide the connection endpoint and necessary credentials (API keys, authentication tokens) for your vector store in Workbench. We handle these credentials with the same rigor as your model API keys (encrypted in transit and at rest, limited access).
- Indirect Data Interaction: Mpalo typically interacts by securely sending query vectors or vectors-to-be-indexed to your store's API endpoint and receiving results (like vector IDs or similarity scores). We do not host or directly manage the raw data within your vector database. This maintains a clear separation of concerns and keeps your core data under your control.
4. Infrastructure Security
Our platform runs on secure cloud infrastructure (details often found in Trust/Security documentation) which benefits from the provider's physical and network security measures. We employ standard security practices like network segmentation, firewalls, intrusion detection systems, and regular security patching.

Your Responsibility: A Practical Guide to Secure Configuration
Securing the connection is a collaborative effort. Follow these steps carefully when using Mpalo Workbench:
-
Generate Dedicated, Least-Privilege API Keys
This is perhaps the most critical step on your end. Before adding a connection in Workbench:
- Log in to your model provider (e.g., OpenAI, Anthropic) or vector store platform.
- Create a brand new API key specifically and exclusively for use by Mpalo. Do *not* reuse keys from other applications.
- Assign only the minimum necessary permissions to this key. For an AI model, this might only be inference capabilities (e.g., `model:predict`) rather than model management or fine-tuning rights. For a vector store, it might be query and upsert permissions, but not index deletion or management rights.
- Never use root or administrator-level keys.
- Securely note the generated key immediately; some platforms only show it once.
-
Securely Input Credentials into Workbench
- Navigate to the relevant connection settings within the Mpalo Workbench.
- Use the designated input fields, which are designed to handle sensitive data securely.
- Verify accuracy before saving. Ensure there are no leading/trailing spaces or transcription errors.
- Do not store these keys insecurely (e.g., in plaintext files, unencrypted emails).
-
Configure and Secure Your Vector Store
- Choose a reputable vector store provider with strong security features.
- Follow their documentation to enable robust authentication (API keys, tokens).
- Configure network access controls. If possible, restrict access to your vector store endpoint only to necessary IP addresses (potentially including Mpalo's egress IPs – contact support if needed).
- Ensure TLS encryption is enforced for all connections to your vector store.
- Understand and configure any data encryption-at-rest options your provider offers.
-
Implement Network Security for Self-Hosted Endpoints
- If you are connecting Mpalo to an API you host yourself, ensure it is protected by a robust, properly configured firewall.
- Your endpoint must use HTTPS with a valid, trusted TLS certificate.
- Consider rate limiting and intrusion detection on your endpoint.
- Again, restricting ingress traffic to known IPs (like Mpalo's) adds a significant layer of security if feasible.
Maintaining Security: Ongoing Best Practices
Security requires continuous vigilance. Adopt these habits:
- Regular Key Rotation: Establish a schedule (e.g., every 90-180 days) to generate new API keys for your connected services and update them in Workbench. This limits the window of opportunity if a key is ever compromised.
- Monitor API & Vector Store Logs: Regularly review usage logs on both the Mpalo platform (if provided) and, more importantly, directly within your external service dashboards (model provider, vector store). Look for anomalous activity, unexpected usage spikes, or requests from unfamiliar sources. Set up alerts if possible.
- Review Permissions Periodically: As your usage evolves, re-evaluate the permissions assigned to the API keys used by Mpalo. Ensure they still align with the principle of least privilege.
- Stay Updated: Pay attention to security announcements from both Mpalo and your external service providers regarding vulnerabilities or recommended updates.
- Decommission Unused Keys/Connections: If you stop using a particular model or vector store connection via Mpalo, immediately revoke or delete the associated API key on the provider's platform and remove the configuration from Workbench.
- Know Your Incident Response Plan: Have a plan for what to do if you suspect a key compromise (e.g., immediately revoke the key, investigate logs, contact relevant support teams).
Conclusion: A Shared Commitment to Security
Mpalo is deeply committed to providing a secure environment for integrating your AI models and data. We achieve this through robust encryption, strict access controls, and secure architectural patterns like leveraging user-controlled external vector stores. However, the overall security of your integrated system fundamentally relies on a partnership.
By diligently following the secure setup guide, implementing ongoing best practices like key rotation and monitoring, and understanding your responsibilities for securing your own endpoints and vector stores, you play an indispensable role. Together, we can ensure your powerful AI integrations are built on a foundation of trust and security.
For further details, please explore our API documentation, Trust & Ethics principles, or contact our support team with any specific security questions.