Security architecture

Security is foundational:

  • VPC deployment — Runs in customer infrastructure
  • Credential encryption — Database credentials encrypted at rest and in transit
  • No data export — Analysis happens through queries; raw data never leaves the database
  • Query logging — Full audit trail of all executed queries
  • Role-based access — Fine-grained permissions at entity and column level
  • Control plane isolation — Lightweight control plane handles updates and telemetry; no customer data transits through it
Use the header to navigate elsewhere, or explore above.