Understand how Okinawa encrypts data at rest and in transit, and configure privacy settings.
At Okinawa, we treat security as a foundational requirement, not an add-on. Every piece of data that flows through our platform — API keys, workflow payloads, integration credentials, and agent outputs — is protected by multiple layers of encryption and access control.
This guide covers how encryption works in Okinawa, what privacy controls are available to you, and how to configure them for your organization's needs.
All data stored in Okinawa is encrypted at rest using AES-256 encryption. This includes:
Encryption keys are managed through AWS KMS with automatic key rotation every 90 days. You can also bring your own keys (BYOK) for added control.
All communication between your browser, CLI, API clients, and Okinawa servers is encrypted using TLS 1.3. This applies to:
We also support mutual TLS (mTLS) for self-hosted cloud agents, ensuring that both the client and server authenticate each other before any data is exchanged.
Integration credentials (API keys, OAuth tokens, etc.) are stored in a dedicated secrets vault with the following protections:
For organizations with data residency requirements, Okinawa supports regional deployments in the following locations:
All workflow executions and data storage remain within your selected region. Self-hosted deployments keep all data within your own network.
Navigate to Settings → Security → Privacy to configure: