Learn
Explore
Security
Transparency into our security posture, compliance certifications, and data protection practices.
Enterprise-grade security controls with continuous monitoring and improvement.
Our security program is built on defense-in-depth principles. We implement network segmentation, intrusion detection, and 24/7 monitoring across all production systems. Security reviews are mandatory for every code change, and our incident response team maintains a median response time under 15 minutes.
All data encrypted at rest (AES-256) and in transit (TLS 1.3).
Customer data is encrypted with AES-256 at rest using AWS KMS-managed keys with automatic annual rotation. All network traffic uses TLS 1.3 with modern cipher suites. Database backups are encrypted, and encryption keys are stored in hardware security modules (HSMs) that are FIPS 140-2 Level 3 validated.
Role-based access, SSO, SCIM provisioning, and audit logs for every action.
Fine-grained role-based access control lets you define exactly who sees what. SSO integration with SAML 2.0 and OIDC providers. SCIM provisioning for automated user lifecycle management. Every access event, data export, and configuration change is logged with immutable audit trails retained for 12 months.
GDPR and CCPA compliant. Your data stays yours. See our Privacy Policy.
We process data in accordance with GDPR and CCPA requirements. Your data is never used to train AI models. Data processing agreements (DPAs) are available on request. We support data portability, right to deletion, and maintain data residency within your preferred region. Annual privacy impact assessments are conducted by an independent third party.
Regular third-party penetration testing. Results available under NDA.
We engage independent security firms to conduct penetration testing at least annually, covering our application, infrastructure, and APIs. Findings are remediated on a risk-prioritized timeline: critical within 24 hours, high within 7 days. Executive summaries of our most recent assessment are available under NDA.
Full list of subprocessors available. We notify you of any changes.
We maintain a curated list of subprocessors and minimize the number of third parties with access to customer data. All subprocessors undergo security review before onboarding. We provide 30 days advance notice before adding any new subprocessor, giving you time to review and raise concerns.
Questions about our security posture? Contact security@adrata.com