Security Architecture & Governance
The ATOM Agent OS – SaaS Platform implements a multi-layered Defense-in-Depth model to ensure strict tenant isolation, safe autonomous execution, and transparent neural governance.
🛡️ The 5 Layers of Tenant Isolation
ATOM SaaS provides physical and logical separation of data at every tier of the execution stack.
1. Database-Level Locking (RLS)
The most critical security layer is PostgreSQL Row-Level Security (RLS). Every table is enabled with a policy that automatically filters all SELECT, UPDATE, and DELETE operations based on the current_tenant_id session variable.
2. Physical Resource Segregation
- Storage (S3): Files are stored under tenant-specific prefixes:
s3://atom-saas/{tenant_id}/. - Memory (Redis): All keys are namespaced:
tenant:{tenant_id}:{key}. - Vector Search (LanceDB): Experience memory is partitioned per tenant to prevent cross-intelligence leakage.
🏗️ Autonomous Execution Security
Agents are restricted in their ability to interact with the underlying infrastructure through three primary mechanisms.
1. Terminal Command Whitelisting
All terminal skill executions pass through a Command Sanitizer. By default, dangerous commands (e.g., rm, sudo, curl) are blocked.
- Tier-Based Access: Premium tiers (Solo+) gain access to network tools like
sshandrsync. - Modes: Tenants can switch between
Restrictive(Whitelist only) andPermissive(All except Blacklist) modes. - Terminal Security Guide →
2. Package Management & Scanning
Before an agent installs a Python dependency for a custom skill:
- Whitelist Check: The package must be approved for the agent's maturity level (
STUDENT,INTERN, etc.). - Vulnerability Scan: Every package is scanned with
pip-auditvia the PackageScannerService. - Isolation: Each skill is executed within its own isolated
virtualenv. - Package Management Guide →
🧠 Neural Governance & Interventions
Security in ATOM is not just about blocking; it's about Human-in-the-Loop control.
1. The Maturity Loop
Agents follow a maturity progression path. High-risk actions (e.g., executing shell scripts, managing billing) are restricted to Supervised or Autonomous agents who have passed a specific readiness score threshold.
2. Administrative Interventions
High-stakes agent actions can trigger an Intervention Requirement.
- Governance Portal: Admins review "Blocked Actions" and can manually approve or deny them.
- Neural Spend Attribution: Real-time monitoring of token usage per-tenant and per-agent prevents adversarial "bill-burning."
📂 Security Reference Directory
- Terminal Security – Command whitelist/blacklist logic.
- Package Management – Secure dependency installation.
- Tenant Isolation – Technical RLS implementation.
- Production Runbook – Infrastructure & monitoring safety.
Last Updated: March 2026 Security Audit Status: 212 E2E tests passing with 100% isolation compliance.