Security

Security at Sherlock Agent

We build Sherlock Agent with the understanding that MSPs and enterprise IT teams entrust us with access to sensitive environments. Security is not an afterthought — it is foundational to everything we build, deploy, and operate.

Our Security Commitment

Sherlock Agent is an AI-powered investigation and remediation platform purpose-built for managed service providers and enterprise IT. Because our platform interacts with production endpoints, collects diagnostic telemetry, and can execute remediation actions, we hold ourselves to the highest standard of security engineering.

Our approach is built on five pillars: strong encryption everywhere, strict tenant isolation, comprehensive audit trails, safe and scoped remediation, and granular access controls. Each of these is detailed below.

Infrastructure & Encryption

Sherlock Agent is hosted on Microsoft Azure in Australia, leveraging Azure's enterprise-grade physical security, network controls, and compliance certifications. Our infrastructure is designed for high availability and resilience.

AES-256 encryption at rest for all stored data including investigation results, telemetry, and configuration
TLS 1.3 in transit for all communications between agents, the platform, and user browsers
Encrypted key management with keys managed through Azure Key Vault with strict access policies
Network segmentation with defence-in-depth architecture and firewall rules at every layer

Tenant Isolation

In a multi-tenant platform serving MSPs who each manage dozens of clients, tenant isolation is paramount. Sherlock Agent enforces strict boundaries so that no tenant can ever access another tenant's data, investigations, or endpoints.

Audit & Compliance

Every action in Sherlock Agent produces an audit record. This is essential for MSPs who need to demonstrate compliance to their clients and for enterprise IT teams operating under regulatory frameworks.

Safe Remediation

Sherlock Agent can execute fixes, not just find problems. Because remediation touches production systems, we have built multiple layers of safety into every step of the process.

Access Control

Sherlock Agent implements role-based access control with granular permissions, ensuring that every user sees only what they need and can do only what they are authorised to do.

Responsible Disclosure

We value the work of security researchers and believe that responsible disclosure of vulnerabilities helps keep our platform and our customers safe. If you discover a potential security issue in Sherlock Agent, we encourage you to report it to us privately.

Please include a clear description of the vulnerability, steps to reproduce, and any supporting evidence. We will acknowledge receipt within 48 hours and work to validate and address the issue promptly. We ask that you give us reasonable time to investigate and remediate before any public disclosure.