Security Considerations

ACE Agent does not use secure communication between microservices. In a production scenario, all ACE Agent microservices should be deployed within a trusted environment and an ingress controller should be used to ensure secure communication between client applications and microservices.

ACE Agent supports storage of API keys as K8s secrets which can be used by different microservices to authenticate with external services. To safe-guard the secrets, system admins should ensure only trusted microservices have access to the K8s cluster or secret encryption should be used

ACE Agent supports logging of both audio and text data for debugging and monitoring purposes. Log data may have PII information. System admins should ensure data is only stored in a trusted environment and use appropriate PII redaction tools before using the log data.