@adminide-stack/yantra-help-browser 12.0.16-alpha.20 → 12.0.16-alpha.21
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/components/HelpCenterFooter.d.ts.map +1 -1
- package/lib/components/HelpCenterFooter.js +93 -73
- package/lib/components/HelpCenterFooter.js.map +1 -1
- package/lib/components/HelpCenterHeader.d.ts.map +1 -1
- package/lib/components/HelpCenterHeader.js +57 -12
- package/lib/components/HelpCenterHeader.js.map +1 -1
- package/lib/components/SearchBar.js +1 -1
- package/lib/pages/HelpCenter/components/HelpCategoryCard.d.ts +2 -0
- package/lib/pages/HelpCenter/components/HelpCategoryCard.d.ts.map +1 -1
- package/lib/pages/HelpCenter/components/HelpCategoryCard.js +135 -50
- package/lib/pages/HelpCenter/components/HelpCategoryCard.js.map +1 -1
- package/lib/pages/HelpCenter/components/Icons.d.ts +10 -0
- package/lib/pages/HelpCenter/components/Icons.d.ts.map +1 -1
- package/lib/pages/HelpCenter/components/Icons.js +211 -1
- package/lib/pages/HelpCenter/components/Icons.js.map +1 -1
- package/lib/pages/HelpCenter/components/PopularArticle.d.ts.map +1 -1
- package/lib/pages/HelpCenter/components/PopularArticle.js +17 -23
- package/lib/pages/HelpCenter/components/PopularArticle.js.map +1 -1
- package/lib/pages/HelpCenter/index.d.ts.map +1 -1
- package/lib/pages/HelpCenter/index.js +105 -30
- package/lib/pages/HelpCenter/index.js.map +1 -1
- package/lib/pages/HelpCenter/mockData.d.ts.map +1 -1
- package/lib/pages/HelpCenter/mockData.js +14 -6
- package/lib/pages/HelpCenter/mockData.js.map +1 -1
- package/lib/templates/content/ai-employees/ai-employees-overview.md +97 -0
- package/lib/templates/content/ai-employees/getting-started-ai-employees.md +119 -0
- package/lib/templates/content/ai-employees/how-ai-employees-work.md +123 -0
- package/lib/templates/content/ai-employees/supervised-mode.md +141 -0
- package/lib/templates/content/content-manifest.json +2082 -93
- package/lib/templates/content/integrations/crm-integrations.md +130 -0
- package/lib/templates/content/integrations/github-integration.md +95 -0
- package/lib/templates/content/integrations/integrations-overview.md +142 -0
- package/lib/templates/content/integrations/monitoring-integrations.md +109 -0
- package/lib/templates/content/integrations/productivity-integrations.md +129 -0
- package/lib/templates/content/integrations/slack-integration.md +79 -0
- package/lib/templates/content/openclaw/openclaw-architecture.md +202 -0
- package/lib/templates/content/openclaw/openclaw-contribution.md +107 -0
- package/lib/templates/content/openclaw/openclaw-overview.md +152 -0
- package/lib/templates/content/platform-features/always-watching.md +63 -0
- package/lib/templates/content/platform-features/instant-context.md +67 -0
- package/lib/templates/content/platform-features/instant-onboarding.md +80 -0
- package/lib/templates/content/platform-features/platform-overview.md +58 -0
- package/lib/templates/content/platform-features/proactive-alerts.md +88 -0
- package/lib/templates/content/platform-features/smart-escalation.md +93 -0
- package/lib/templates/content/security-compliance/audit-trail.md +112 -0
- package/lib/templates/content/security-compliance/compliance.md +120 -0
- package/lib/templates/content/security-compliance/data-encryption.md +94 -0
- package/lib/templates/content/security-compliance/security-overview.md +186 -0
- package/lib/templates/content/security-compliance/vm-isolation.md +126 -0
- package/lib/templates/content/solutions-engineering/bug-tracking-context.md +126 -0
- package/lib/templates/content/solutions-engineering/engineering-overview.md +107 -0
- package/lib/templates/content/solutions-engineering/error-monitoring.md +120 -0
- package/lib/templates/content/solutions-engineering/institutional-memory.md +120 -0
- package/lib/templates/content/solutions-marketing/brand-monitoring.md +135 -0
- package/lib/templates/content/solutions-marketing/content-automation.md +111 -0
- package/lib/templates/content/solutions-marketing/marketing-overview.md +108 -0
- package/lib/templates/content/solutions-marketing/social-media-management.md +108 -0
- package/lib/templates/content/solutions-sales/call-preparation.md +106 -0
- package/lib/templates/content/solutions-sales/crm-automation.md +119 -0
- package/lib/templates/content/solutions-sales/lead-management.md +108 -0
- package/lib/templates/content/solutions-sales/sales-overview.md +120 -0
- package/lib/templates/content/use-cases/engineering-use-cases.md +123 -0
- package/lib/templates/content/use-cases/marketing-use-cases.md +128 -0
- package/lib/templates/content/use-cases/sales-use-cases.md +123 -0
- package/lib/templates/content/use-cases/support-use-cases.md +120 -0
- package/lib/templates/content/use-cases/use-cases-overview.md +115 -0
- package/package.json +2 -2
- package/lib/pages/HelpCenter/components/BookStack.js +0 -36
- package/lib/pages/HelpCenter/components/BookStack.js.map +0 -1
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
# Yantra Platform Overview
|
|
2
|
+
|
|
3
|
+
Yantra is an **AI-powered workforce platform** that deploys intelligent AI employees into your existing toolchain. Unlike traditional chatbots that wait for prompts, Yantra AI employees operate proactively — monitoring your communication channels, development pipelines, CRM systems, and project management tools around the clock.
|
|
4
|
+
|
|
5
|
+
## Why Yantra Exists
|
|
6
|
+
|
|
7
|
+
Modern teams lose significant productivity to repetitive operational tasks:
|
|
8
|
+
|
|
9
|
+
- **Context fragmentation**: Critical information is scattered across dozens of tools
|
|
10
|
+
- **Manual data entry**: Teams spend hours updating CRMs, logging notes, and syncing systems
|
|
11
|
+
- **Knowledge silos**: When team members leave or switch projects, institutional knowledge disappears
|
|
12
|
+
- **Alert overload**: Engineers, salespeople, and marketers drown in notifications without clear prioritization
|
|
13
|
+
|
|
14
|
+
Yantra solves these problems by providing AI employees that integrate directly into your workflow and handle operational overhead autonomously.
|
|
15
|
+
|
|
16
|
+
## Core Philosophy
|
|
17
|
+
|
|
18
|
+
### Proactive, Not Reactive
|
|
19
|
+
|
|
20
|
+
Traditional AI assistants answer when asked. Yantra AI employees **watch, learn, and act** without waiting for instructions. They surface issues before they escalate, update systems before data goes stale, and share context before you need to ask.
|
|
21
|
+
|
|
22
|
+
### Gradual Trust Model
|
|
23
|
+
|
|
24
|
+
Every Yantra AI employee starts in supervised mode. You review and approve all actions. Over time, as trust builds, you can grant more autonomy — letting the AI employee handle routine tasks independently while escalating only the important decisions.
|
|
25
|
+
|
|
26
|
+
### Built on OpenClaw
|
|
27
|
+
|
|
28
|
+
Yantra is built on top of [OpenClaw](https://github.com/openclaw), a battle-tested open-source AI agent framework. This means transparent, auditable AI behavior backed by a thriving community of contributors and enterprise users.
|
|
29
|
+
|
|
30
|
+
## What Yantra AI Employees Can Do
|
|
31
|
+
|
|
32
|
+
| Capability | Description |
|
|
33
|
+
| ------------------------------- | ---------------------------------------------------------- |
|
|
34
|
+
| **Continuous Monitoring** | Watch Slack, GitHub, error trackers, CRMs, and email 24/7 |
|
|
35
|
+
| **Contextual Correlation** | Connect data points across tools to surface insights |
|
|
36
|
+
| **Automated Actions** | Update CRMs, create tickets, draft messages, and log notes |
|
|
37
|
+
| **Intelligent Alerting** | Filter noise and escalate only what matters |
|
|
38
|
+
| **Institutional Memory** | Capture and recall every interaction, decision, and fix |
|
|
39
|
+
| **Multi-Channel Communication** | Interact via Slack, WhatsApp, Telegram, or email |
|
|
40
|
+
|
|
41
|
+
## Who Uses Yantra
|
|
42
|
+
|
|
43
|
+
- **Engineering Teams**: Monitor errors, correlate bugs with deployments, maintain institutional knowledge
|
|
44
|
+
- **Sales Teams**: Auto-update CRMs, prepare call briefs, ensure 100% follow-up on leads
|
|
45
|
+
- **Marketing Teams**: Manage social media presence, draft content from product updates, track brand mentions
|
|
46
|
+
- **Support Teams**: Route issues proactively, surface relevant context for customer problems
|
|
47
|
+
- **Operations Teams**: Keep systems synchronized and teams informed
|
|
48
|
+
|
|
49
|
+
## Getting Started
|
|
50
|
+
|
|
51
|
+
Setting up Yantra takes approximately 5 minutes:
|
|
52
|
+
|
|
53
|
+
1. **Connect your tools** — One-click OAuth for Slack, GitHub, HubSpot, Sentry, Linear, Gmail, and 40+ more
|
|
54
|
+
2. **Configure preferences** — Define what your AI employee should watch for and how to prioritize
|
|
55
|
+
3. **Start supervised** — Review and approve all AI actions to build trust
|
|
56
|
+
4. **Expand autonomy** — Gradually let your AI employee work independently on routine tasks
|
|
57
|
+
|
|
58
|
+
For detailed setup instructions, see the [Getting Started Guide](/help-center/ai-employees/getting-started-ai-employees).
|
|
@@ -0,0 +1,88 @@
|
|
|
1
|
+
# Proactive Alerts — Know Before It Escalates
|
|
2
|
+
|
|
3
|
+
Yantra AI employees don't wait for you to discover problems — they detect issues early and notify you with full context, so you can respond before situations escalate.
|
|
4
|
+
|
|
5
|
+
## How Proactive Alerts Work
|
|
6
|
+
|
|
7
|
+
Your AI employee continuously analyzes events across all connected tools, looking for patterns and anomalies that indicate something needs attention. When it detects an issue, it:
|
|
8
|
+
|
|
9
|
+
1. **Correlates the signal** with data from other tools to understand the full scope
|
|
10
|
+
2. **Checks for existing responses** — whether someone is already handling it or a ticket exists
|
|
11
|
+
3. **Assesses severity** based on your configured thresholds and historical patterns
|
|
12
|
+
4. **Delivers a contextualized alert** with all relevant information and suggested actions
|
|
13
|
+
|
|
14
|
+
## Alert Types
|
|
15
|
+
|
|
16
|
+
### Error Spike Alerts
|
|
17
|
+
|
|
18
|
+
When your error monitoring tool (Sentry, Datadog, etc.) shows an unusual increase in exceptions, your AI employee investigates:
|
|
19
|
+
|
|
20
|
+
- Identifies the root error and affected components
|
|
21
|
+
- Checks if the spike correlates with a recent deployment
|
|
22
|
+
- Looks for existing tickets or ongoing fixes
|
|
23
|
+
- Notifies the appropriate team with a complete summary
|
|
24
|
+
|
|
25
|
+
### Customer Impact Alerts
|
|
26
|
+
|
|
27
|
+
When multiple customers report similar issues or a high-value account encounters a problem:
|
|
28
|
+
|
|
29
|
+
- Cross-references support channels with technical monitoring
|
|
30
|
+
- Surfaces the customer's history and account importance
|
|
31
|
+
- Suggests response templates based on similar past incidents
|
|
32
|
+
|
|
33
|
+
### Stale Activity Alerts
|
|
34
|
+
|
|
35
|
+
When important items stop progressing:
|
|
36
|
+
|
|
37
|
+
- Deals that haven't been updated in your CRM
|
|
38
|
+
- Pull requests awaiting review beyond your team's SLA
|
|
39
|
+
- Support tickets approaching response time limits
|
|
40
|
+
|
|
41
|
+
### Anomaly Alerts
|
|
42
|
+
|
|
43
|
+
When metrics deviate from normal patterns:
|
|
44
|
+
|
|
45
|
+
- Unusual traffic patterns or usage drops
|
|
46
|
+
- Unexpected changes in deployment frequency
|
|
47
|
+
- Communication volume spikes in specific channels
|
|
48
|
+
|
|
49
|
+
## Smart Escalation
|
|
50
|
+
|
|
51
|
+
Not every alert deserves your attention. Yantra uses **smart escalation** to ensure you only get interrupted when it genuinely matters:
|
|
52
|
+
|
|
53
|
+
### Severity Classification
|
|
54
|
+
|
|
55
|
+
- **Informational**: Logged for reference, included in daily briefings
|
|
56
|
+
- **Low**: Batched and delivered at your preferred check-in times
|
|
57
|
+
- **Medium**: Delivered promptly but not urgently
|
|
58
|
+
- **High**: Immediate notification through your preferred channel
|
|
59
|
+
- **Critical**: Multi-channel notification with escalation chain
|
|
60
|
+
|
|
61
|
+
### Escalation Rules
|
|
62
|
+
|
|
63
|
+
You define what constitutes each severity level:
|
|
64
|
+
|
|
65
|
+
- Error count thresholds (e.g., 50+ occurrences in 1 hour = Critical)
|
|
66
|
+
- Customer tier triggers (e.g., Enterprise account issues always escalate)
|
|
67
|
+
- Time-based rules (e.g., P0 tickets unresponded after 15 minutes)
|
|
68
|
+
- Custom keyword triggers (e.g., "data loss", "security breach")
|
|
69
|
+
|
|
70
|
+
## Configuring Alerts
|
|
71
|
+
|
|
72
|
+
Navigate to your AI employee's preferences to set:
|
|
73
|
+
|
|
74
|
+
- **Notification channels**: Where alerts get delivered (Slack, email, WhatsApp, Telegram)
|
|
75
|
+
- **Quiet hours**: When to batch non-critical alerts
|
|
76
|
+
- **Escalation chains**: Who gets notified if the primary responder doesn't acknowledge
|
|
77
|
+
- **Alert suppression**: Rules to prevent duplicate or noise alerts
|
|
78
|
+
|
|
79
|
+
## Alert History
|
|
80
|
+
|
|
81
|
+
All alerts are logged with:
|
|
82
|
+
|
|
83
|
+
- Timestamp and severity
|
|
84
|
+
- Full context at the time of alerting
|
|
85
|
+
- Actions taken (by the AI employee or team members)
|
|
86
|
+
- Resolution status and timeline
|
|
87
|
+
|
|
88
|
+
This history helps refine alert thresholds over time and provides data for post-incident reviews.
|
|
@@ -0,0 +1,93 @@
|
|
|
1
|
+
# Smart Escalation — Only Get Pinged When It Matters
|
|
2
|
+
|
|
3
|
+
Yantra's smart escalation system ensures you're only interrupted for issues that truly require your attention, filtering out noise while never missing critical events.
|
|
4
|
+
|
|
5
|
+
## The Noise Problem
|
|
6
|
+
|
|
7
|
+
Modern development and business teams are overwhelmed by notifications:
|
|
8
|
+
|
|
9
|
+
- Hundreds of Slack messages daily
|
|
10
|
+
- Dozens of error alerts, most of which are duplicates or low priority
|
|
11
|
+
- CRM notifications for routine stage changes
|
|
12
|
+
- Email threads that don't require immediate action
|
|
13
|
+
|
|
14
|
+
This constant noise creates **alert fatigue**, causing teams to miss genuinely important issues buried in the flood. Yantra solves this by acting as an intelligent filter between your tools and your attention.
|
|
15
|
+
|
|
16
|
+
## How Smart Escalation Works
|
|
17
|
+
|
|
18
|
+
### 1. Signal Analysis
|
|
19
|
+
|
|
20
|
+
Every event from your connected tools is analyzed for:
|
|
21
|
+
|
|
22
|
+
- **Severity**: How impactful is this event?
|
|
23
|
+
- **Novelty**: Is this a new issue or a known one being tracked?
|
|
24
|
+
- **Scope**: How many users, customers, or systems are affected?
|
|
25
|
+
- **Trend**: Is this getting better or worse?
|
|
26
|
+
|
|
27
|
+
### 2. Context Enrichment
|
|
28
|
+
|
|
29
|
+
Before escalating, your AI employee gathers full context:
|
|
30
|
+
|
|
31
|
+
- Related events from other tools
|
|
32
|
+
- Historical data on similar issues
|
|
33
|
+
- Current status of any existing responses
|
|
34
|
+
- Who is available and responsible for this type of issue
|
|
35
|
+
|
|
36
|
+
### 3. Decision Logic
|
|
37
|
+
|
|
38
|
+
Based on your configured rules and the enriched context, Yantra decides:
|
|
39
|
+
|
|
40
|
+
- **Absorb silently**: Log it, include in daily summary
|
|
41
|
+
- **Batch for later**: Group with related items for periodic review
|
|
42
|
+
- **Notify gently**: Send a non-urgent message at your next check-in
|
|
43
|
+
- **Escalate immediately**: Push a notification through your preferred urgent channel
|
|
44
|
+
- **Trigger escalation chain**: If no response within the defined window, escalate to the next person
|
|
45
|
+
|
|
46
|
+
## Escalation Configuration
|
|
47
|
+
|
|
48
|
+
### Threshold-Based Rules
|
|
49
|
+
|
|
50
|
+
```
|
|
51
|
+
Error Count Rules:
|
|
52
|
+
- Less than 5 occurrences → Log only
|
|
53
|
+
- 5-25 occurrences → Batch notification
|
|
54
|
+
- 25-100 occurrences → Immediate notification
|
|
55
|
+
- 100+ occurrences → Critical escalation chain
|
|
56
|
+
```
|
|
57
|
+
|
|
58
|
+
### Customer Tier Rules
|
|
59
|
+
|
|
60
|
+
- **Enterprise accounts**: All issues escalated immediately
|
|
61
|
+
- **Pro accounts**: P0/P1 issues escalated, others batched
|
|
62
|
+
- **Free accounts**: Included in daily summaries
|
|
63
|
+
|
|
64
|
+
### Time-Based Rules
|
|
65
|
+
|
|
66
|
+
- **Business hours**: Standard escalation flow
|
|
67
|
+
- **Off hours**: Only critical issues escalate; everything else queued for morning
|
|
68
|
+
- **Weekends**: Emergency-only escalation with higher thresholds
|
|
69
|
+
|
|
70
|
+
## Escalation Chains
|
|
71
|
+
|
|
72
|
+
Define cascading notification paths for critical issues:
|
|
73
|
+
|
|
74
|
+
1. **Primary responder**: Notified first via Slack and email
|
|
75
|
+
2. **Backup responder**: Notified after 10 minutes if no acknowledgment
|
|
76
|
+
3. **Team lead**: Notified after 20 minutes if still unacknowledged
|
|
77
|
+
4. **On-call manager**: Final escalation for sustained non-response
|
|
78
|
+
|
|
79
|
+
## Feedback Loop
|
|
80
|
+
|
|
81
|
+
Yantra learns from your responses to refine escalation over time:
|
|
82
|
+
|
|
83
|
+
- If you consistently dismiss certain alert types, it adjusts thresholds
|
|
84
|
+
- If you escalate items that were batched, it increases their priority
|
|
85
|
+
- Monthly escalation reports help you tune your rules
|
|
86
|
+
|
|
87
|
+
## Getting Started
|
|
88
|
+
|
|
89
|
+
1. Connect your tools via [Integrations](/help-center/integrations/integrations-overview)
|
|
90
|
+
2. Set your default escalation preferences in the AI employee configuration
|
|
91
|
+
3. Define customer tiers and priority thresholds
|
|
92
|
+
4. Specify quiet hours and escalation chains
|
|
93
|
+
5. Review and refine based on the weekly escalation summary
|
|
@@ -0,0 +1,112 @@
|
|
|
1
|
+
# Audit Trail
|
|
2
|
+
|
|
3
|
+
Every action taken by a Yantra AI employee is comprehensively logged, providing full transparency and accountability for compliance, debugging, and trust-building purposes.
|
|
4
|
+
|
|
5
|
+
## What Gets Logged
|
|
6
|
+
|
|
7
|
+
### Event Processing
|
|
8
|
+
|
|
9
|
+
- Every event received from connected tools
|
|
10
|
+
- How the event was classified and prioritized
|
|
11
|
+
- Which correlations were made with other data sources
|
|
12
|
+
- Time to process and resulting decisions
|
|
13
|
+
|
|
14
|
+
### Actions Taken
|
|
15
|
+
|
|
16
|
+
- **Informational**: Morning briefings, context summaries, status updates
|
|
17
|
+
- **Alerts**: Notifications sent to team members with severity context
|
|
18
|
+
- **Updates**: CRM field changes, ticket updates, status modifications
|
|
19
|
+
- **Creations**: New tickets, contacts, or records created
|
|
20
|
+
- **Drafts**: Messages and content drafted for approval
|
|
21
|
+
- **Escalations**: Issues routed to humans for decision
|
|
22
|
+
|
|
23
|
+
### Approval Workflow
|
|
24
|
+
|
|
25
|
+
- Actions drafted and presented for approval
|
|
26
|
+
- Approval, edit, or rejection decisions by human reviewers
|
|
27
|
+
- Time from draft to action for each item
|
|
28
|
+
- Modification details when actions are edited before approval
|
|
29
|
+
|
|
30
|
+
## Log Structure
|
|
31
|
+
|
|
32
|
+
Each audit log entry contains:
|
|
33
|
+
|
|
34
|
+
| Field | Description |
|
|
35
|
+
| ------------------- | ------------------------------------------------------------- |
|
|
36
|
+
| **Timestamp** | Precise UTC timestamp of the action |
|
|
37
|
+
| **Action ID** | Unique identifier for the action |
|
|
38
|
+
| **Action Type** | Category (inform, alert, update, create, draft, escalate) |
|
|
39
|
+
| **Target Tool** | Which integration was affected (Slack, HubSpot, GitHub, etc.) |
|
|
40
|
+
| **Target Resource** | Specific resource (channel, deal, issue, etc.) |
|
|
41
|
+
| **Trigger** | What event or condition triggered the action |
|
|
42
|
+
| **Context** | Data from other tools that informed the decision |
|
|
43
|
+
| **Previous Value** | State before the action (for updates) |
|
|
44
|
+
| **New Value** | State after the action |
|
|
45
|
+
| **Approval Status** | Auto-approved, human-approved, human-edited, or rejected |
|
|
46
|
+
| **Approver** | Who approved the action (if human-approved) |
|
|
47
|
+
| **Outcome** | Success, failure, or pending |
|
|
48
|
+
|
|
49
|
+
## Accessing Audit Logs
|
|
50
|
+
|
|
51
|
+
### Dashboard
|
|
52
|
+
|
|
53
|
+
Navigate to **AI Employee → Audit Trail** in your Yantra dashboard:
|
|
54
|
+
|
|
55
|
+
- Filter by date range, action type, target tool, or approval status
|
|
56
|
+
- Search for specific resources, actions, or keywords
|
|
57
|
+
- Export logs in CSV or JSON format
|
|
58
|
+
- Visualize action patterns over time
|
|
59
|
+
|
|
60
|
+
### API Access
|
|
61
|
+
|
|
62
|
+
Enterprise customers can access audit logs programmatically:
|
|
63
|
+
|
|
64
|
+
- REST API for log retrieval and filtering
|
|
65
|
+
- Webhook notifications for real-time log streaming
|
|
66
|
+
- Integration with external SIEM tools
|
|
67
|
+
- Scheduled export for compliance archives
|
|
68
|
+
|
|
69
|
+
## Compliance Use Cases
|
|
70
|
+
|
|
71
|
+
### SOC 2 Audit Support
|
|
72
|
+
|
|
73
|
+
Audit logs provide evidence for SOC 2 controls:
|
|
74
|
+
|
|
75
|
+
- Access control effectiveness
|
|
76
|
+
- Change management procedures
|
|
77
|
+
- Incident response documentation
|
|
78
|
+
- Data handling compliance
|
|
79
|
+
|
|
80
|
+
### GDPR Compliance
|
|
81
|
+
|
|
82
|
+
For data subject requests:
|
|
83
|
+
|
|
84
|
+
- Identify all data processed for a specific individual
|
|
85
|
+
- Document the legal basis for each processing activity
|
|
86
|
+
- Provide evidence for data processing inventories
|
|
87
|
+
- Support right-to-erasure request fulfillment
|
|
88
|
+
|
|
89
|
+
### Internal Review
|
|
90
|
+
|
|
91
|
+
Regular audit log review helps:
|
|
92
|
+
|
|
93
|
+
- Verify AI employee behavior meets expectations
|
|
94
|
+
- Identify areas for configuration improvement
|
|
95
|
+
- Detect unusual patterns or potential security issues
|
|
96
|
+
- Build confidence in AI employee autonomy
|
|
97
|
+
|
|
98
|
+
## Retention
|
|
99
|
+
|
|
100
|
+
### Log Retention Periods
|
|
101
|
+
|
|
102
|
+
- **Action logs**: Retained for 12 months by default (configurable)
|
|
103
|
+
- **Approval records**: Retained for 24 months
|
|
104
|
+
- **Security events**: Retained for 36 months
|
|
105
|
+
- **Custom retention**: Enterprise customers can configure custom retention periods
|
|
106
|
+
|
|
107
|
+
### Deletion
|
|
108
|
+
|
|
109
|
+
- Logs are purged automatically after retention period expires
|
|
110
|
+
- Customers can request early deletion in writing
|
|
111
|
+
- Deletion is permanent and irreversible
|
|
112
|
+
- Deletion confirmation provided for compliance records
|
|
@@ -0,0 +1,120 @@
|
|
|
1
|
+
# Compliance and Certifications
|
|
2
|
+
|
|
3
|
+
Yantra maintains rigorous compliance standards to meet the security and regulatory requirements of enterprise customers across industries.
|
|
4
|
+
|
|
5
|
+
## Standards and Certifications
|
|
6
|
+
|
|
7
|
+
### SOC 2 Type II
|
|
8
|
+
|
|
9
|
+
- Annual third-party audit covering Security, Availability, and Confidentiality trust principles
|
|
10
|
+
- Report available to customers under NDA
|
|
11
|
+
- Continuous monitoring of SOC 2 controls
|
|
12
|
+
- Remediation tracking for any identified findings
|
|
13
|
+
|
|
14
|
+
### GDPR (General Data Protection Regulation)
|
|
15
|
+
|
|
16
|
+
Yantra's GDPR compliance covers:
|
|
17
|
+
|
|
18
|
+
- **Lawful basis**: Clear legal basis for all data processing
|
|
19
|
+
- **Data minimization**: Only collecting and processing data necessary for service delivery
|
|
20
|
+
- **Right to access**: Customers can request export of all their data
|
|
21
|
+
- **Right to erasure**: Complete data deletion upon request
|
|
22
|
+
- **Data portability**: Standard format data export available
|
|
23
|
+
- **Data protection officer**: Designated DPO for privacy oversight
|
|
24
|
+
- **Data processing agreements**: Available for all customers
|
|
25
|
+
|
|
26
|
+
### CCPA (California Consumer Privacy Act)
|
|
27
|
+
|
|
28
|
+
- Right to know what data is collected and how it's used
|
|
29
|
+
- Right to delete personal information
|
|
30
|
+
- Right to opt out of data sharing
|
|
31
|
+
- No sale of personal information — ever
|
|
32
|
+
|
|
33
|
+
### Additional Compliance Support
|
|
34
|
+
|
|
35
|
+
- **HIPAA**: Business Associate Agreement available for healthcare customers (enterprise plan)
|
|
36
|
+
- **ISO 27001**: Security management practices aligned with ISO 27001 framework
|
|
37
|
+
- **PCI DSS**: Payment data never touches Yantra systems (handled by payment processor)
|
|
38
|
+
- **FERPA**: Available for educational institution customers
|
|
39
|
+
|
|
40
|
+
## Data Processing
|
|
41
|
+
|
|
42
|
+
### Data Processing Agreement (DPA)
|
|
43
|
+
|
|
44
|
+
Available for all customers, covering:
|
|
45
|
+
|
|
46
|
+
- Nature and purpose of data processing
|
|
47
|
+
- Categories of personal data processed
|
|
48
|
+
- Technical and organizational measures
|
|
49
|
+
- Sub-processor management and notification
|
|
50
|
+
- Data breach notification procedures
|
|
51
|
+
- Data return and deletion upon termination
|
|
52
|
+
|
|
53
|
+
### Sub-Processors
|
|
54
|
+
|
|
55
|
+
Yantra uses a limited number of sub-processors:
|
|
56
|
+
|
|
57
|
+
- Cloud infrastructure providers (SOC 2 certified)
|
|
58
|
+
- AI model providers (with strict data usage restrictions)
|
|
59
|
+
- Payment processors (PCI DSS compliant)
|
|
60
|
+
- Analytics tools (privacy-first, no personal data shared)
|
|
61
|
+
|
|
62
|
+
A current list of sub-processors is maintained and customers are notified of changes.
|
|
63
|
+
|
|
64
|
+
### Data Residency
|
|
65
|
+
|
|
66
|
+
- **Default**: US-based infrastructure (US-East and US-West)
|
|
67
|
+
- **EU**: Available for customers requiring EU data residency
|
|
68
|
+
- **Additional regions**: Available on enterprise plans
|
|
69
|
+
- No data transfer outside specified regions without written consent
|
|
70
|
+
|
|
71
|
+
## Privacy by Design
|
|
72
|
+
|
|
73
|
+
### Minimal Data Collection
|
|
74
|
+
|
|
75
|
+
- Only data necessary for service delivery is collected
|
|
76
|
+
- No data collection for marketing or advertising purposes
|
|
77
|
+
- No data shared with or sold to third parties
|
|
78
|
+
- AI model providers do not retain customer data
|
|
79
|
+
|
|
80
|
+
### Data Lifecycle Management
|
|
81
|
+
|
|
82
|
+
1. **Collection**: Minimum necessary data collected during integration
|
|
83
|
+
2. **Processing**: Data processed within isolated customer environments
|
|
84
|
+
3. **Storage**: Encrypted storage with customer-specific keys
|
|
85
|
+
4. **Retention**: Configurable retention periods (default: 12 months)
|
|
86
|
+
5. **Deletion**: Automatic deletion after retention period; manual deletion on request
|
|
87
|
+
|
|
88
|
+
## Security Assessments
|
|
89
|
+
|
|
90
|
+
### Penetration Testing
|
|
91
|
+
|
|
92
|
+
- Annual penetration tests by independent security firms
|
|
93
|
+
- Results reviewed and remediated promptly
|
|
94
|
+
- Summary available to enterprise customers under NDA
|
|
95
|
+
|
|
96
|
+
### Vulnerability Management
|
|
97
|
+
|
|
98
|
+
- Automated vulnerability scanning for all components
|
|
99
|
+
- Dependency scanning for known CVEs
|
|
100
|
+
- Patch management SLA: Critical (24h), High (72h), Medium (7d)
|
|
101
|
+
- Bug bounty program for responsible vulnerability disclosure
|
|
102
|
+
|
|
103
|
+
### Business Continuity
|
|
104
|
+
|
|
105
|
+
- Disaster recovery plan tested quarterly
|
|
106
|
+
- Business impact analysis reviewed annually
|
|
107
|
+
- Incident response plan documented and rehearsed
|
|
108
|
+
- Communication plan for security events
|
|
109
|
+
|
|
110
|
+
## Requesting Compliance Documents
|
|
111
|
+
|
|
112
|
+
Enterprise customers can request:
|
|
113
|
+
|
|
114
|
+
- SOC 2 Type II report
|
|
115
|
+
- Penetration test summary
|
|
116
|
+
- Data processing agreement
|
|
117
|
+
- Security architecture white paper
|
|
118
|
+
- Sub-processor list
|
|
119
|
+
|
|
120
|
+
Contact your account manager or email security@yantra.ai to request any compliance documentation.
|
|
@@ -0,0 +1,94 @@
|
|
|
1
|
+
# Data Encryption
|
|
2
|
+
|
|
3
|
+
Yantra employs multiple layers of encryption to protect your data at every stage — in transit, at rest, and during processing.
|
|
4
|
+
|
|
5
|
+
## Encryption in Transit
|
|
6
|
+
|
|
7
|
+
### TLS Configuration
|
|
8
|
+
|
|
9
|
+
- All connections use **TLS 1.2 or higher**
|
|
10
|
+
- TLS 1.0 and 1.1 are disabled across all endpoints
|
|
11
|
+
- Strong cipher suites only — weak ciphers are explicitly blocked
|
|
12
|
+
- Perfect Forward Secrecy (PFS) enabled on all connections
|
|
13
|
+
- HSTS headers enforced with long max-age values
|
|
14
|
+
|
|
15
|
+
### What's Encrypted in Transit
|
|
16
|
+
|
|
17
|
+
- API requests between your tools and the Yantra Gateway
|
|
18
|
+
- Internal communication between Yantra components
|
|
19
|
+
- Data sent to and received from AI model providers
|
|
20
|
+
- Dashboard access and administrative API calls
|
|
21
|
+
- Webhook payloads from integrated tools
|
|
22
|
+
|
|
23
|
+
## Encryption at Rest
|
|
24
|
+
|
|
25
|
+
### Storage Encryption
|
|
26
|
+
|
|
27
|
+
- All persistent data encrypted using **AES-256** encryption
|
|
28
|
+
- Database-level encryption enabled for all data stores
|
|
29
|
+
- File system encryption on all VM storage volumes
|
|
30
|
+
- Backup data encrypted with the same standards as primary data
|
|
31
|
+
|
|
32
|
+
### Key Management
|
|
33
|
+
|
|
34
|
+
- Encryption keys managed through a dedicated **Key Management Service (KMS)**
|
|
35
|
+
- Customer-specific keys isolate each tenant's data
|
|
36
|
+
- Keys are rotated on a regular schedule (quarterly minimum)
|
|
37
|
+
- Key access is logged and auditable
|
|
38
|
+
- Emergency key revocation procedures tested quarterly
|
|
39
|
+
|
|
40
|
+
## Credential Management
|
|
41
|
+
|
|
42
|
+
### OAuth Tokens
|
|
43
|
+
|
|
44
|
+
- OAuth access and refresh tokens stored in encrypted secret vaults
|
|
45
|
+
- Token encryption uses separate keys from data encryption
|
|
46
|
+
- Tokens are scoped to minimum required permissions
|
|
47
|
+
- Token refresh is handled automatically and securely
|
|
48
|
+
|
|
49
|
+
### API Keys
|
|
50
|
+
|
|
51
|
+
- API keys encrypted at rest using dedicated key encryption keys
|
|
52
|
+
- Keys are never stored in plaintext anywhere in the system
|
|
53
|
+
- API key rotation supported without service interruption
|
|
54
|
+
- Compromised keys can be revoked instantly
|
|
55
|
+
|
|
56
|
+
### What We Never Store
|
|
57
|
+
|
|
58
|
+
- Your tool passwords (OAuth is used instead)
|
|
59
|
+
- Credit card numbers (handled by payment processor)
|
|
60
|
+
- Raw authentication credentials
|
|
61
|
+
- Secrets in application logs or error reports
|
|
62
|
+
|
|
63
|
+
## Processing Security
|
|
64
|
+
|
|
65
|
+
### In-Memory Protection
|
|
66
|
+
|
|
67
|
+
- Sensitive data in processing memory is cleared after use
|
|
68
|
+
- Memory isolation between customer workloads via VM separation
|
|
69
|
+
- No swap-to-disk of sensitive in-memory data
|
|
70
|
+
|
|
71
|
+
### AI Model Interactions
|
|
72
|
+
|
|
73
|
+
- Prompts sent to AI models are encrypted in transit
|
|
74
|
+
- No customer data is retained by model providers for training
|
|
75
|
+
- Model provider connections use dedicated, authenticated channels
|
|
76
|
+
- Prompts are constructed to minimize exposure of sensitive information
|
|
77
|
+
|
|
78
|
+
## Verification
|
|
79
|
+
|
|
80
|
+
### How to Verify
|
|
81
|
+
|
|
82
|
+
- Check TLS configuration: Our endpoints pass SSL Labs A+ rating
|
|
83
|
+
- Request our latest SOC 2 report for encryption control details
|
|
84
|
+
- Audit logs show encryption status for all data operations
|
|
85
|
+
- Penetration test results available for enterprise customers upon NDA
|
|
86
|
+
|
|
87
|
+
### Compliance Alignment
|
|
88
|
+
|
|
89
|
+
Our encryption practices align with:
|
|
90
|
+
|
|
91
|
+
- **NIST 800-171**: Encryption requirements for controlled data
|
|
92
|
+
- **ISO 27001**: Information security management standards
|
|
93
|
+
- **PCI DSS**: Payment card industry data security standards
|
|
94
|
+
- **FIPS 140-2**: Federal information processing standards
|