Hyponema
Blog

Security checklist for production voice agents

Production voice agents need tenant isolation, encrypted provider keys, signed integrations, audit logs, retention controls, export and deletion paths, and runtime safety policies.

Security8 min read

Protect production voice agents

tenant isolation, retention, and runtime guardrails

Short checklist

A production voice agent should protect both the operator workspace and the human user in the conversation. That means securing credentials, isolating tenant data, signing external events, limiting retention, exposing audit trails, and making export or deletion workflows possible.

  • Keep workspace API keys on the server; browsers should use signed session tokens.
  • Encrypt provider keys before storage and never expose plaintext to operators.
  • Enforce tenant isolation at the database layer.
  • Sign webhooks and reject unsafe callback targets.
  • Store audit records for privileged operator actions.
  • Provide user export and deletion workflows.
  • Apply runtime guardrails before assistant output reaches the user.

Credential handling

Voice agents often need model, speech, voice, telephony, webhook, and internal API credentials. Provider keys should be encrypted with envelope encryption, decrypted only when a conversation needs them, and hidden from normal operator views.

A workspace API key should never be shipped to a web page or mobile client. Use your backend to create a signed session URL or token, then hand only that scoped session credential to the client.

Data boundaries

Tenant isolation should not depend only on application code. Database-level row-level security gives the platform a second boundary when queries evolve. Every tenant-scoped entity should carry a tenant ID, and every repository path should respect that boundary.

ControlPurposeOperator question answered
RLS tenant isolationPrevent cross-workspace data accessCan another workspace see this user?
Audit logRecord privileged changesWho changed the agent, key, member, or policy?
Retention controlsLimit long-term exposureHow long do transcripts or recordings stay?
DSAR export and forgetSupport user rights workflowsCan we export or delete this user data?

Runtime safety

Static policy documents are not enough for agents that talk to customers. Runtime safety checks should run where risk appears: before assistant output, around retrieval, near tool calls, and during escalation decisions.

For sensitive products, teams should define no-go zones, escalation rules, sleep windows, fatigue handling, and topic cooldowns before launch.

Related pages

Questions

Questions about this guide.

Can browser clients call the Hyponema workspace API directly?
No. Workspace API keys should stay on the customer backend. Browser clients should receive only signed session URLs or tokens scoped to a specific session.
What is envelope encryption for provider keys?
Envelope encryption encrypts each provider credential with a data-encryption key, then protects that key with a key-encryption key. It limits plaintext exposure and supports controlled credential use at runtime.

Sources

Early access

Ship the voice agent. Keep control of the stack.

Join the waitlist for early access to Hyponema's production workspace for building, deploying, and operating voice agents.