Overview
Telepath implements enterprise-grade security for your Voice AI infrastructure. Understand and implement these best practices to keep your system secure.Credential Management
API Key Security
Your API keys are sensitive credentials that grant full access to your account. Best Practices:-
Never Commit Keys:
-
Use Environment Variables:
-
Rotate Regularly:
- Rotate every 90 days
- Immediately if exposed
- When team members leave
-
Scope Keys Appropriately:
- Create separate keys for different services
- Use read-only keys where possible
- Revoke unused keys
SIP Credentials
Your SIP username and password authenticate calls with carriers. Best Practices:-
Strong Passwords:
- Minimum 12 characters
- Mix uppercase, lowercase, numbers, symbols
- Avoid dictionary words
- Don’t reuse across connections
-
Rotate Passwords:
- Use dashboard to rotate
- Update carrier configuration immediately
- Test before discarding old password
-
Limit Distribution:
- Share only with authorized team members
- Use separate credentials per environment
- Never share in chat or email
AI Provider Credentials
OpenAI, ElevenLabs, and custom endpoints require credentials. Best Practices:-
Separate Service Accounts:
- Create dedicated accounts per integration
- Don’t use personal API keys
- Enable IP whitelisting if available
-
API Key Scoping:
- Limit permissions to minimum needed
- Use read-only keys where possible
- Set spending limits/quotas
-
Audit Access:
- Review API key usage regularly
- Monitor for unusual activity
- Set up provider-side alerts
Data Encryption
In Transit
HTTPS/TLS: All API communications use TLS 1.2+- Encrypted between your application and Telepath
- Encrypted between Telepath and carriers (SIP TLS)
- Encrypted between Telepath and AI providers
- TLS recommended for sensitive deployments
- UDP acceptable for controlled networks
At Rest
Credential Storage: AES-256 encryption- API keys encrypted with AES-256
- SIP passwords encrypted with AES-256
- AI provider credentials encrypted
- Stored in secure database with access controls
- Call metadata encrypted
- Audio not stored by default
- PII handled per compliance needs
Access Control
Dashboard Authentication
-
Strong Passwords:
- Enforce minimum 12 characters
- Regular password changes recommended
- No password sharing
-
Two-Factor Authentication (if available):
- Enable for all accounts
- Use authenticator app or hardware key
- Never use SMS when possible
-
Session Management:
- Automatic logout after 30 minutes of inactivity
- Concurrent session limits
- Session invalidation on logout
API Key Management
Create Keys:- Go to Settings → API Keys
- Click Create New Key
- Give it a descriptive name
- Copy immediately (you won’t see it again)
- Go to Settings → API Keys
- Click Revoke next to the key
- Confirm the action
- Any apps using the key will immediately break
- Each key shows last used timestamp
- View request count per day
- Set up alerts for unusual activity
Team Permissions
If available in your plan:- Admin: Full access, can manage team
- Editor: Create/modify connections, view logs
- Viewer: Read-only access to logs and settings
- Billing: Manage billing and payment methods
- Give team members minimum required permissions
- Create role-specific API keys
- Regularly audit permission assignments
Network Security
IP Whitelisting
If your provider supports it, whitelist Telepath IPs: Telepath IP Ranges:- Add Telepath IPs to whitelist
- Test calls from other IPs to verify blocking
- Keep list updated
VPC/Network Isolation
For enterprise deployments:- Use VPC for internal systems
- Restrict access to authorized networks only
- Monitor all inbound/outbound connections
Compliance & Regulations
PCI DSS
If handling payment card data:- Don’t store card data in call logs
- Ensure PCI compliance with AI providers
- Audit access to sensitive calls
HIPAA
For healthcare applications:- Enable encryption for all data
- Implement access controls
- Maintain audit logs
- Use Business Associate Agreement with providers
GDPR
For European users:- Implement right to deletion
- Get explicit consent before recording
- Keep privacy policy updated
- Comply with data residency requirements
CCPA
For California residents:- Disclose data collection practices
- Honor deletion requests
- Provide data access
- Implement non-discrimination
Call Recording & Privacy
Recording Considerations
Legal Requirements:- Consent: Most jurisdictions require all-party consent
- Notification: Announce recording at call start
- Retention: Store only as long as needed
- Security: Encrypt all recordings
Audio Storage
By default, Telepath does NOT store audio:- Carrier audio not stored
- AI agent responses not stored
- Only metadata and transcripts available
- Reduces privacy concerns
- Use custom WebSocket endpoint to capture audio
- Implement secure storage
- Comply with legal requirements
- Provide deletion mechanisms
Audit & Logging
Dashboard Audit Log
Track all account activities:- API key creation/deletion
- Connection modifications
- Settings changes
- Team member changes
- Go to Settings → Audit Log
- View all actions with timestamps
- Export for compliance
API Access Logging
Monitor API usage:- Every API call logged
- Source IP recorded
- Timestamp and duration
- Error messages captured
- Unusual access times
- Spike in API calls
- Errors or failed attempts
- Access from unexpected locations
Incident Response
Suspected Compromise
If you suspect credentials are compromised:-
Immediately:
- Revoke compromised API keys
- Rotate SIP passwords
- Change dashboard password
- Enable 2FA if not already enabled
-
Within 1 Hour:
- Review audit logs for unauthorized access
- Check call logs for suspicious activity
- Contact support
-
Document:
- Note timestamp of discovery
- List potentially affected API keys
- Identify any unusual calls
Security Incident
Report security issues to: security@telepathvoice.com Include:- Description of issue
- Affected components
- When you discovered it
- Any steps you’ve taken
Best Practices Summary
Development
- ✅ Use environment variables for secrets
- ✅ Never commit keys to version control
- ✅ Use
.gitignorefor .env files - ✅ Use separate keys for dev/staging/production
- ✅ Test with read-only keys when possible
Deployment
- ✅ Use secrets management (HashiCorp Vault, AWS Secrets Manager)
- ✅ Rotate credentials regularly
- ✅ Monitor for suspicious API usage
- ✅ Log all access attempts
- ✅ Use TLS for all connections
Team
- ✅ Limit credential distribution
- ✅ Use principle of least privilege
- ✅ Audit team access regularly
- ✅ Have exit procedures for leaving team members
- ✅ Train team on security practices
Monitoring
- ✅ Review audit logs weekly
- ✅ Set up alerts for unusual activity
- ✅ Monitor API quota usage
- ✅ Check error rates for anomalies
- ✅ Review carrier-side alerts
Support
For security concerns:- Email: security@telepathvoice.com
- Dashboard: Create support ticket
- Urgent: Include “URGENT SECURITY” in subject

