Documentation Index
Fetch the complete documentation index at: https://mintlify.com/helicone/helicone/llms.txt
Use this file to discover all available pages before exploring further.
Overview
Helicone is built with enterprise-grade security from the ground up. We maintain SOC 2 Type II certification, implement encryption at rest and in transit, and provide secure API key management through our Vault feature.Helicone’s security features ensure:
- Your API keys and sensitive data are protected
- Compliance with SOC 2, GDPR, and industry standards
- Control over data storage and processing
- Audit trails for all API interactions
Security Standards
SOC 2 Type II
Independently audited for security, availability, and confidentiality controls
GDPR Compliant
Full compliance with European data protection regulations
Encryption
AES-256 encryption at rest, TLS 1.3 in transit
Zero Trust
API key authentication with fine-grained access controls
Compliance Certifications
SOC 2 Type II
Helicone maintains SOC 2 Type II compliance, demonstrating our commitment to:- Security: Protection against unauthorized access
- Availability: System uptime and reliability
- Confidentiality: Secure handling of sensitive information
- Processing Integrity: Accurate and authorized processing
- Privacy: Protection of personal information
SOC 2 reports are available to enterprise customers. Contact enterprise@helicone.ai to request access.
GDPR Compliance
Our GDPR compliance includes:- Data minimization: We only collect necessary data
- Right to access: Users can request their data
- Right to deletion: Complete data removal on request
- Data portability: Export data in standard formats
- Consent management: Clear opt-in mechanisms
- Data processing agreements: Available for all customers
Encryption
Data at Rest
All data stored in Helicone is encrypted using:- AES-256 encryption for database records
- Transparent column-level encryption for sensitive fields
- AEAD encryption for API keys in Vault
- Encrypted backups with separate key management
Data in Transit
All communications use:- TLS 1.3 for API requests
- HTTPS-only endpoints (no HTTP)
- Certificate pinning for mobile SDKs
- Perfect forward secrecy for all connections
Key Management
Encryption keys are:- Rotated regularly
- Stored in hardware security modules (HSMs)
- Never exposed in logs or error messages
- Separate from data storage
Vault: Secure Key Management
Helicone Vault provides secure storage and management for provider API keys.Centralized Storage
Store all provider keys securely in one place
Proxy Keys
Generate Helicone proxy keys instead of distributing provider keys
Instant Revocation
Revoke proxy keys immediately without rotating provider keys
Access Control
Grant granular permissions per proxy key
How Vault Works
Without Vault:Setting Up Vault
Store Provider Keys
Navigate to Vault Settings and add your provider API keys:
- OpenAI keys
- Anthropic keys
- Other provider keys
Create Proxy Keys
Generate Helicone proxy keys that reference your stored provider keys. Each proxy key can have:
- Custom names and descriptions
- Rate limits
- Budget limits
- Usage tracking
Distribute Proxy Keys
Give proxy keys to users, departments, or applications. They never see the underlying provider keys.
Vault Security Features
Provider Key Encryption:- AEAD (Authenticated Encryption with Associated Data)
- Column-level transparent encryption
- Keys never appear in database dumps
- Separate key management infrastructure
- One-way hashing (cannot be reverse-engineered)
- Unique per creation
- Instantly revocable
- No rate limit on creation
- Departmental Access
- Temporary Access
- Client Projects
Create separate proxy keys per department:
Access Control
API Key Types
| Key Type | Permissions | Use Case |
|---|---|---|
| API Key | Full organization access | Application integration |
| Proxy Key | Limited to stored provider keys | User distribution |
| Read-Only Key | View logs and metrics only | Analytics tools |
Role-Based Access Control (RBAC)
Control team member permissions:- Owner: Full administrative access
- Admin: Manage settings, keys, and team
- Member: View logs and analytics
- Viewer: Read-only access to dashboard
IP Allowlisting
Restrict API access to specific IP ranges:Data Privacy
Data Retention
- Request logs: 90 days default (configurable up to 2 years)
- Analytics data: Aggregated and retained indefinitely
- Deleted data: Permanently removed within 30 days
- Backups: Encrypted and retained for 90 days
Data Deletion
Request complete data deletion:- Contact privacy@helicone.ai
- We delete all associated data within 30 days
- Confirmation provided upon completion
Data Export
Export your data anytime:Self-Hosting
For maximum control, deploy Helicone on your infrastructure:Docker Deployment
Single-command deployment with Docker Compose
Kubernetes
Production-ready Helm charts for Kubernetes
- Complete data sovereignty
- Custom compliance requirements
- Air-gapped deployments
- No data leaves your infrastructure
Audit Logging
Comprehensive audit trails for compliance:- API access logs: Every request logged with timestamp, IP, and user
- Configuration changes: Track all settings modifications
- Key creation/revocation: Full audit trail of key management
- Data access: Log all data exports and deletions
Security Best Practices
Rotate API keys regularly
Rotate API keys regularly
Rotate Helicone API keys every 90 days. Use Vault proxy keys for distribution to simplify rotation.
Use environment variables
Use environment variables
Never hardcode API keys in source code:
Implement rate limiting
Implement rate limiting
Protect against abuse with rate limits:
Monitor for anomalies
Monitor for anomalies
Set up alerts for unusual patterns:
- Unexpected cost spikes
- Failed authentication attempts
- Unusual request volumes
- New IP addresses
Minimize data exposure
Minimize data exposure
Configure logging to exclude sensitive data:
Use HTTPS only
Use HTTPS only
Always use HTTPS endpoints. Helicone rejects HTTP requests:
Incident Response
In case of security concerns:- Report immediately: security@helicone.ai
- Include details: Timeline, affected resources, potential impact
- We respond within: 24 hours for all reports, 4 hours for critical issues
- We provide: Incident timeline, remediation steps, prevention measures
Security Resources
Security Policy
Read our full security policy
Penetration Testing
Annual third-party security assessments
Bug Bounty
Responsible disclosure program
Status Page
Real-time system status and incidents
Compliance Documentation
Enterprise customers can access:- SOC 2 Type II reports
- Penetration test results
- Data processing agreements (DPA)
- Business associate agreements (BAA)
- Security questionnaires
Related Resources
Self-Hosting
Deploy Helicone on your infrastructure
API Authentication
Learn about API key management
