Security Model
How DeepLayer secures your OpenClaw instances.
Isolation
Each customer's OpenClaw instance runs in its own isolated container with:
- Dedicated persistent storage volume
- Private network namespace
- Per-instance secrets and credentials
- No cross-customer filesystem access
Network security
- All traffic is encrypted via TLS at the edge proxy
- OpenClaw instances are not directly exposed to the internet
- Connections route through our managed proxy layer with IP filtering
- OpenClaw runs in
trusted-proxyauth mode, trusting only our proxy network
Authentication
Instance access is controlled through:
- Auth tokens — generated per instance for API access
- Admin passwords — for OpenClaw admin operations
- Client portal login — email/password authentication for the web dashboard
Best practices
- Rotate credentials periodically using the Reset Credentials feature
- Use the principle of least privilege when sharing instance access
- Monitor your instance activity through the client portal