Data Isolation and Security Controls

Data Isolation and Security Controls

Logical Isolation

  • We leverage row-level security and tenant-specific identifiers to ensure data separation in shared environments.
  • Access to data is restricted to authorized users within your organization, enforced by stringent application and database-level permissions.

Encryption

  • Data at Rest: Sensitive customer files are encrypted using AES-256 with per-tenant customer-managed keys. All other data is protected by AWS default encryption at rest (for example, S3 default bucket encryption and other service-native encryption).
  • Data in Transit: Communications between customers and our platform are secured with TLS to prevent eavesdropping or tampering.

Related platform controls