A comprehensive overview of REM Labs security architecture, controls, and compliance posture for enterprise evaluation.
REM Labs provides a memory infrastructure API that stores, indexes, retrieves, and consolidates memory data for AI agents and applications. The architecture is designed for security, simplicity, and self-hostability.
For self-hosted deployments, the architecture collapses to a single container: your application communicates directly with the REM API running on your infrastructure, with SQLite on local disk or mounted volume. No external dependencies are required.
REM Labs employs encryption at every layer of the data lifecycle.
| At rest | AES-256 encryption for all stored data. Memory content, metadata, and indexes are encrypted on disk. |
| In transit | TLS 1.3 enforced for all API communications. HSTS headers prevent protocol downgrade attacks. Minimum TLS version is 1.2. |
| API keys | Hashed with SHA-256 before storage. Raw keys are never stored, logged, or transmitted after initial generation. |
| Customer-managed keys | Enterprise tier supports customer-managed encryption keys (CMEK), allowing customers to control the encryption keys used for their data. |
| Backup encryption | All automated S3 backups are encrypted using server-side encryption (SSE-S3 or SSE-KMS). |
Authentication is handled via API keys for programmatic access and OAuth 2.0 / SAML for interactive access.
REM Labs implements defense-in-depth authorization with multiple isolation boundaries.
Every memory operation is scoped to a namespace. Namespaces provide hard data boundaries -- a request authenticated with one namespace's credentials cannot read or write data in another namespace. This isolation is enforced at the database query level, not just the application layer.
| Owner | Full access. Can manage billing, team members, API keys, and all data operations. |
| Admin | Can manage team members, API keys, and all data operations. Cannot modify billing. |
| Editor | Can create, read, update, and delete memories within assigned namespaces. |
| Viewer | Read-only access to memories within assigned namespaces. Cannot modify data. |
REM Labs follows strict data handling principles designed to give customers full control over their data.
We do not train on customer data. Customer memory data is never used for model training, product analytics, or any purpose beyond providing the contracted service. This commitment is contractual and applies to all tiers.
Every API call to REM Labs is logged with a comprehensive audit trail. Audit logs are immutable and designed to support compliance audits and security investigations.
| Timestamp | ISO 8601 UTC timestamp of the request. |
| User / API key | Hashed identifier of the authenticated entity (never the raw key). |
| Action | The API operation performed (store, recall, search, delete, etc.). |
| Resource | The namespace and memory ID affected by the operation. |
| IP address | Source IP of the request (on managed deployments). |
| Response code | HTTP status code returned. |
| Rate limit state | Remaining quota and limit tier at time of request. |
Audit logs are exportable in JSON and CSV formats via the admin dashboard or API. Enterprise customers can configure log forwarding to external SIEM systems.
REM Labs maintains a documented incident response process with defined SLAs for acknowledgment and resolution.
| Acknowledgment | All security incidents are acknowledged within 24 hours of detection or report. |
| Resolution target | Critical and high-severity incidents: 72-hour resolution target. Medium/low: 7-day target. |
| Notification | Affected customers are notified within 72 hours of a confirmed data breach, per GDPR Article 33 requirements. |
| Post-incident | Root cause analysis and remediation report published within 14 days of incident resolution. |
Security researchers and customers can report vulnerabilities to dev@remlabs.ai. We commit to acknowledging all reports within 24 hours and providing a resolution timeline within 72 hours.
| Backup method | SQLite WAL (Write-Ahead Logging) mode with automated snapshots to S3-compatible storage. |
| Backup frequency | Every 6 hours (automated). On-demand backups available via admin dashboard. |
| RPO | 6 hours (maximum data loss in a disaster scenario). |
| RTO | 30 minutes (target time to restore service). |
| Cross-region | Enterprise tier includes cross-region backup replication for geographic redundancy. |
| Backup encryption | All backups are encrypted at rest using the same AES-256 encryption as primary storage. |
| Recovery testing | Backup restoration is tested quarterly to verify integrity and recovery procedures. |
The API implements multiple layers of network and application-level protections.
REM Labs conducts regular security assessments to identify and remediate vulnerabilities.
REM Labs is actively pursuing industry-standard compliance certifications.
The following table summarizes the key security controls implemented by REM Labs.
| Encryption at rest | AES-256 |
| Encryption in transit | TLS 1.3 (minimum 1.2) |
| API key storage | SHA-256 hashed, never plaintext |
| Authentication | API keys, OAuth 2.0, SAML 2.0, OIDC |
| Authorization | RBAC (4 roles) + namespace isolation |
| Audit logging | Every API call, immutable, exportable |
| Data residency | US, EU, or self-hosted (any region) |
| Backup RPO / RTO | 6 hours / 30 minutes |
| Breach notification | 72 hours (GDPR compliant) |
| Customer data usage | Never used for training |
| SOC 2 Type II | In progress (Q3 2026) |
| Self-hosted option | Full on-premise / air-gapped support |
For security questions, to request a detailed security review, or to report a vulnerability, contact our team.
dev@remlabs.ai