Security at Erdo
Our platform is built with layered safeguards across encryption, network isolation, and access controls.
Your Data is Encrypted
Data Encryption
Our system encrypts your data at rest, in transit, and across every tenant boundary.
- End-to-end transport encryption
- All communication between Erdo services stays encrypted in transit.
- AES-256-GCM at rest
- Stored data is encrypted with AES-256-GCM before persisting to disk.
- Multi-layer keys
- Organization, user, and dataset keys combine to prevent single-key compromise.
- Customer-managed keys
- We use Google Cloud KMS keys to control infrastructure-level encryption.
Code Execution
Secure Code Execution Sandbox
Every execution runs inside isolated, resource-constrained containers with strict guardrails.
- Application kernel
- Workloads run inside containers that isolate the host kernel.
- No root access
- Executions run as non-privileged users with Linux capabilities removed.
- Network restrictions
- Containers only reach the public internet while private ranges remain blocked.
- Filesystem controls
- Writable directories are confined and code/input paths are read-only.
- Resource limits
- CPU, memory, runtime, and output size are strictly capped.
- File validation
- Path traversal and sensitive directories (.ssh, .kube, etc.) are denied.
Private Networking
Network Security
Private networking keeps workloads segregated while TLS-first communication protects every connection.
- Private infrastructure
- Compute runs inside private VPCs with no public node IPs.
- Isolated environments
- Execution and data platforms operate in separate VPCs without interconnects.
- Firewall rules
- Only required ports stay open and each is restricted by source.
- TLS everywhere
- TLS is enforced for both external endpoints and service-to-service calls.
- WAF protection
- Managed WAF rules block OWASP top 10 threats, bots, and DDoS traffic.
Secure Access
Authentication & Access Control
Fine-grained identity and authorization controls make sure only the right people and systems gain access to your data and workloads.
- Hashed API tokens
- API tokens are stored as hashes so plaintext keys never persist.
- Timing-safe auth
- Constant-time comparisons prevent timing attacks on credentials.
- Role-based access control
- Permissions span organization, user, thread, dataset, and integration layers.
- Row-level security
- Users only query datasets and resources they are authorized to access.
- OAuth with CSRF protection
- State parameters and CSRF tokens are validated for every OAuth flow.
- Encrypted integration credentials
- Connected account tokens are encrypted with each dataset's unique key.
- Automatic token rotation
- Token refreshes occur automatically with secure rotation policies.
Enterprise-grade Infrastructure
Infrastructure Security
Secure-by-default infrastructure and operational rigor keep our platform secure.
- Shielded VMs
- GKE nodes use secure boot and integrity monitoring.
- Workload Identity
- Services authenticate to Google Cloud without storing key files.
- Least-privilege IAM
- Service accounts only hold the minimal permissions required.
- Automatic security updates
- Infrastructure subscribes to managed release channels for patches.
- Image vulnerability scanning
- Container images are scanned before deployment for known CVEs.
Code Security
Code Integrity & Security
Integrity-focused delivery practices protect the code that powers Erdo.
- Signed container images
- Images are signed with cosign to verify integrity before release.
- Infrastructure as code
- Security configuration lives in version-controlled IaC for audits.
- Secret management
- Google Secret Manager stores replicated infrastructure secrets.
Audit Logs
Logging & Audits
Comprehensive telemetry, tracing, and rate limits deliver audit-ready visibility.
- Real-time error tracking
- Incidents trigger alerts instantly for rapid response.
- Structured API logging
- Every API call is logged with rich metadata for traceability.
- Sandbox execution audit
- Each sandbox run logs requests, outputs, and errors.
- Data query logging
- Query activity is captured with user context across the data platform.
- Request tracing
- Structured logs propagate request IDs for end-to-end tracing.
- API token usage tracking
- Last-used timestamps power security reviews for each token.
- Edge and app rate limiting
- Rate controls at multiple layers defend against brute-force and abuse.
Data Retention
Data Retention Policies
Data retention and lifecycle policies ensure records are removed the moment customers leave our platform.
- Immediate dataset deletion
- Dataset data is purged as soon as a user account is deleted.
- Cascading data removal
- Related records, embeddings, and metadata are automatically deleted across all systems.
- Backup and log cleanup
- Backups and audit logs containing customer data are removed according to retention policies.
Employee Access Controls
Employee Access Controls
Strict least-privilege processes keep our team separated from customer data.
- Minimal employee access
- Employees only access systems required for their role.
- Per-employee database credentials
- Individual credentials ensure complete audit trails.
- 2FA enforced everywhere
- Multi-factor authentication protects internal and third-party systems.