Meetra AI
  • Welcome to Meetra AI API
  • Meetra AI Conversation Intelligence API Building Blocks
  • Meetra AI Conversation Intelligence API Reference
    • User Login
    • Upload Audio / Video material
    • Speaker Detection
    • Rename Speaker
    • Speaker Balance Score
    • Topic Dynamics & Details
    • Speaker Key Points
    • Conversation and Speaker Summaries
    • Conversation Topics and Keywords
    • Questions Asked
    • Conversation Transcript
    • Conversation Dynamics
    • Conversation Emotions
    • Speaker Emotions Over Time
    • Sentiment Score
    • Conversational Energy
    • Interaction Score
    • Interaction Strength Between Speakers
    • Speaker Audio Quality
    • Individual Speaker Balance
  • Built with Meetra AI
    • 🌟NorthStar
      • Example: Meeting Quality Analysis
  • Contact Us
  • Tech Stack and Models
    • Project Structure
    • Database Structure
    • General Audio Processing Flow
    • Security Considerations
    • Open Source Usage in the Codebase
Powered by GitBook
On this page
  • Application Architecture Security
  • Application Security
  • Database Security
  • Data Processing Security
  • Compliance Standards
  1. Tech Stack and Models

Security Considerations

Application Architecture Security

  • Authorization and Token Control: API access is controlled through authorization and token management.

  • WAF Protection: Cloudflare is used as a Web Application Firewall (WAF).

  • Backend Access Restriction: The backend for the application (demo.meetra.ai) is strictly accessible only from the frontend application.

  • SSL Encryption: Connection security is enforced through SSL encryption.

Application Security

  • Protection Against Common Attacks: Implemented safeguards against OWASP Top 10 attacks, including XSS, CSRF, SQL Injection, and Session Hijacking.

  • Input Validation: All input data is validated and sanitized before processing.

  • Regular Updates: Libraries, components, and production environments are regularly updated to prevent the exploitation of known vulnerabilities.

Database Security

  • Data Encryption: Data is encrypted at rest, and all sensitive data is hashed.

  • Restricted Database Access: Database access for application users is limited.

  • Regular Backups: Data backups are performed regularly.

Data Processing Security

  • Data Anonymization: Data is anonymized before processing.

  • AI Instance Isolation: AI instances are isolated with proprietary models and a custom GPT instance hosted in the cloud.

Compliance Standards

  • Certifications and Standards: Compliant with ISO 27001, 27017/18, 27701, ISO 9001, WCAG, SOC 1/2/3, KNF EBA, and EU Cloud standards when storing data on Azure cloud.

PreviousGeneral Audio Processing FlowNextOpen Source Usage in the Codebase

Last updated 6 months ago