Security
Protecting your credentials, data, and Voice AI infrastructure
Overview
Telepath implements enterprise-grade security for your Voice AI infrastructure. The practices below help you keep your system, credentials, and customer data safe.
Credential Management
API Key Security
Your API keys grant full access to your account. Treat them as passwords.
- Never commit keys to version control. Use environment variables or a secrets manager instead.
- Rotate every 90 days — and immediately if a key is exposed or a team member leaves.
- Scope keys appropriately — create separate keys per service; use read-only keys wherever write access is not needed; revoke unused keys.
# Store as environment variable, not in code
export TELEPATH_API_KEY="sk_live_abc123def456..."
SIP Credentials
Your SIP username and password authenticate calls with carriers.
- Use strong passwords: minimum 12 characters, mixed case, numbers, and symbols
- Rotate passwords via the dashboard after any suspected exposure; update your carrier configuration immediately
- Never share SIP credentials over chat or email; use separate credentials per environment
AI Provider Credentials
- Create dedicated service accounts per integration — do not use personal API keys in production
- Enable IP whitelisting on the provider side where available
- Set spending limits or quotas to cap unintended usage
- Review API key usage regularly and set up provider-side alerts for anomalies
Data Encryption
In Transit
- HTTPS/TLS 1.2+ — all API communications between your application and Telepath
- SIP TLS — recommended for sensitive deployments; UDP is acceptable for controlled private networks
- AI Provider — all traffic between Telepath and AI providers is encrypted in transit
At Rest
- API keys, SIP passwords, and AI provider credentials are stored with AES-256 encryption
- Call metadata is encrypted; audio is not stored by default
Access Control
Dashboard Authentication
- Use a strong, unique password (minimum 12 characters)
- Enable two-factor authentication (authenticator app preferred over SMS)
- Sessions automatically expire after 30 minutes of inactivity
API Key Management
Go to Settings → API Keys and click Create New Key
Give the key a descriptive name that identifies its purpose
Copy the key immediately — it will not be displayed again
To revoke a key, click Revoke in Settings → API Keys; any application using it will immediately lose access
Team Permissions
Apply the principle of least privilege — give team members only the access they need:
- Admin — full account access and team management
- Editor — create and modify connections; view logs
- Viewer — read-only access to logs and settings
- Billing — manage payment methods and billing information
Network Security
IP Whitelisting
If your carrier supports IP whitelisting, add Telepath’s IP ranges to restrict which sources can authenticate SIP calls. Contact [email protected] or check the dashboard for current Telepath IP ranges.
VPC / Network Isolation
For enterprise deployments: run internal systems inside a VPC; restrict dashboard and API access to authorized networks; monitor all inbound and outbound connections.
Compliance & Regulations
HIPAA
For healthcare applications, enable encryption for all data, implement strict access controls, maintain complete audit logs, and execute a Business Associate Agreement (BAA) with all relevant providers.
GDPR
For European users, implement the right to erasure, obtain explicit consent before any recording, keep your privacy policy current, and comply with data residency requirements.
CCPA
For California users, disclose data collection practices, honor deletion requests, provide data access on demand, and implement non-discrimination policies.
PCI DSS
Do not store payment card data in call logs. Ensure PCI compliance with any AI providers that may touch cardholder data.
Call Recording & Privacy
Default Behavior
By default, Telepath does not store audio — carrier audio and AI agent responses are streamed in real time and not retained. Only call metadata and, where applicable, transcripts are stored.
If You Capture Audio
If your application captures audio via a custom WebSocket endpoint:
- Announce recording to callers at the start of every call (“This call may be recorded…”)
- Store recordings with encryption at rest
- Comply with all applicable consent and retention laws in your jurisdiction
- Implement a deletion mechanism so recordings can be removed on request
Audit & Logging
Dashboard Audit Log
All account activities — API key creation/deletion, connection modifications, settings changes, and team changes — are logged with timestamps. Access via Settings → Audit Log; export for compliance reporting.
API Access Logging
Every API call is logged with source IP, timestamp, duration, and error messages. Review for unusual patterns: unexpected access times, spikes in call volume, or access from unrecognized IPs.
Incident Response
Suspected Compromise
- Immediately: revoke compromised API keys; rotate SIP passwords; change your dashboard password; enable 2FA if not already on
- Within 1 hour: review audit logs for unauthorized access; check call logs for suspicious activity; contact [email protected]
- Document: note the discovery timestamp, list affected API keys, and identify any suspicious calls
Report a Security Issue
Email [email protected] with a description of the issue, the affected components, when you discovered it, and any steps already taken. Include “URGENT SECURITY” in the subject for critical issues.
Best Practices Checklist
Development
- Use environment variables for all secrets
- Add
.envfiles to.gitignore - Use separate API keys for dev, staging, and production
- Test with read-only keys wherever possible
Deployment
- Use a secrets manager (HashiCorp Vault, AWS Secrets Manager, etc.)
- Rotate credentials on a regular schedule
- Enable TLS for all connections
- Log all access attempts and API calls
Team
- Limit credential distribution to those who need it
- Audit team access quarterly
- Have a defined off-boarding procedure for departing team members
- Train the team on credential hygiene