Best Practices
Tips and best practices for using vaults
Pro Tips
Organizing Your Vaults
One vault per case/matter:
Or one vault per document type:
Using Metadata Effectively
Add rich metadata to make documents findable:
Later you can filter searches:
Bulk Upload Pattern
Security & Encryption
How Your Documents Are Protected
- Encryption at rest:
- All S3 buckets use AWS KMS encryption
- Your KMS key (if provided) or AWS managed keys
- Data encrypted before writing to disk
- Encryption in transit:
- All API calls use HTTPS/TLS 1.3
- Presigned URLs are time-limited (1 hour)
- No permanent public access
- Access control:
- API key required for all operations
- Vaults scoped to your organization
- Can't access other orgs' vaults
- Isolation:
- Each vault has separate S3 buckets
- No data leakage between vaults
- Vector indexes are vault-specific
Best Practices
- Use your own KMS keys for sensitive data
- Rotate API keys regularly
- Use presigned URLs for temporary access
- Add metadata to track document sensitivity
- Audit vault access via usage logs
Best Practices
Vault Organization
Good:
Bad:
Metadata Strategy
Always include:
- Case/matter ID: Link documents to cases
- Document type: deposition, medical_record, contract, etc.
- Dates: Creation, incident, filing dates
- Parties: Plaintiff, defendant, witnesses
- Topics/tags: Key subjects for filtering
Example:
Upload + Ingest Pattern
Always ingest after uploading to make documents searchable: