Security
Security & Trust
Protecting your data is foundational to everything we build. Here's how we keep your information safe.
At Griot, security is not an afterthought — it is woven into our platform architecture, development practices, and operational processes. We are committed to maintaining the highest standards of data protection for our customers and their data.
1. Infrastructure & Hosting
The Griot platform is hosted on Google Cloud Platform (GCP), leveraging enterprise-grade infrastructure with built-in redundancy and high availability.
- Hosted on GCP with SOC 2 Type II certified data centers
- Infrastructure managed as code for consistency and auditability
- Managed database and compute services with automatic patching
- Network segmentation and firewall rules to minimize attack surface
- Automated scaling to ensure availability during traffic spikes
2. Encryption
All data is encrypted both in transit and at rest to protect against unauthorized access.
- In transit: All communications are encrypted using TLS 1.2 or higher. We enforce HTTPS for all connections to the Griot platform.
- At rest: All stored data is encrypted using AES-256 encryption, the industry standard for data at rest protection.
- Key management: Encryption keys are managed through Google Cloud KMS with automatic key rotation.
3. Tenant Isolation
Griot is a multi-tenant platform with strict logical isolation between customers.
- Each customer's data is logically isolated with separate data namespaces
- No cross-tenant data access is possible — all queries are scoped to the authenticated tenant
- Tenant identifiers are enforced at the application and database layers
- Regular testing to verify isolation boundaries
4. Access Controls
We implement strict access controls at every level of the platform.
Platform access
- Role-based access control (RBAC) for all platform users
- SSO and SAML integration available for enterprise customers
- Passwordless authentication via magic links and OAuth providers
- Session management with automatic expiry and token rotation
Internal access
- Principle of least privilege for all team members
- Multi-factor authentication (MFA) required for all internal systems
- Regular access reviews with prompt deprovisioning when roles change
- Privileged access logging and monitoring
5. Application Security
Security is integrated throughout our software development lifecycle.
- Secure coding practices aligned with the OWASP Top 10
- Code review required for all changes before deployment
- Automated dependency scanning to detect and remediate known vulnerabilities
- Input validation and output encoding to prevent injection and cross-site scripting attacks
- Regular security assessments and testing
6. Compliance
Griot is committed to meeting the compliance requirements of our customers across jurisdictions.
- SOC 2 Type II: Our infrastructure provider (GCP) maintains SOC 2 Type II certification
- GDPR: Our platform and processes are aligned with the requirements of the General Data Protection Regulation. A Data Processing Agreement is available at /dpa
- Kenya Data Protection Act: We comply with the Kenya Data Protection Act 2019 as our primary jurisdiction
- Data residency: We can discuss data residency requirements for enterprise customers
7. Incident Response
We maintain a documented incident response plan to ensure rapid detection, containment, and resolution of security events.
- 24/7 automated monitoring and alerting for security anomalies
- Defined escalation procedures with clear roles and responsibilities
- Customer notification within 72 hours of a confirmed data breach, as outlined in our Data Processing Agreement
- Post-incident review and remediation to prevent recurrence
8. Business Continuity
We ensure the availability and resilience of the Griot platform through robust business continuity practices.
- Automated daily backups with point-in-time recovery capabilities
- Disaster recovery procedures tested regularly
- Uptime monitoring with real-time status tracking
- Geographically distributed infrastructure for resilience
9. Vendor Security
We carefully evaluate and monitor all third-party vendors and sub-processors.
- Security assessment of all vendors before engagement
- Contractual security and data protection requirements for all sub-processors
- Ongoing monitoring of vendor security posture and compliance status
- A current list of sub-processors is maintained in our Data Processing Agreement
10. Vulnerability Disclosure
We welcome responsible disclosure of security vulnerabilities. If you discover a potential security issue, please report it to us so we can address it promptly.
Report a Vulnerability
Email: security@griotdata.com
Please include a detailed description of the vulnerability, steps to reproduce, and any relevant screenshots or proof-of-concept. We will acknowledge receipt within 2 business days and aim to provide an initial assessment within 5 business days.