Erdo

Security at Erdo

Our platform is built with layered safeguards across encryption, network isolation, and access controls.

Your Data is Encrypted

Data Encryption

Your data is encrypted in transit and at rest, with per-tenant key isolation.

AES-256 at rest
Your data is encrypted with AES-256 before it is written to disk.
Per-tenant key isolation
Each organization and dataset has its own key. A compromise in one tenant can't unlock another's data.

Code Execution

Secure Code Execution Sandbox

Analysis code runs inside a sandbox — an isolated, one-shot environment with no host access and no persistent state.

Kernel-level isolation
A kernel-level sandbox intercepts every system call, so untrusted code can never reach the host.
One-shot, ephemeral environments
A fresh sandbox per execution, destroyed when done. Nothing carries over.
Non-root, capability-dropped
Sandboxes run unprivileged — no root, no privilege escalation, no Linux capabilities.
Network egress restricted
Sandboxes cannot reach internal services or cloud metadata endpoints.
Enforced resource limits
CPU, memory, runtime, output, and upload counts are capped. Runaway workloads are terminated.
Path traversal defences
Input paths are validated against a strict blocklist. Only an ephemeral workdir is writable.

Private Networking

Network Isolation

Production compute has no public IPs, and the code execution environment is separated from the rest of the platform.

Isolated code execution environment
The code execution environment runs in its own VPC. The only path between it and the main application is through authenticated APIs.
Private compute
Production compute has no public IPs. Inbound traffic reaches only authenticated endpoints.

Secure Access

Authentication & Access Control

Scoped tokens and layered RBAC control access to your data.

Scoped, revocable tokens
API tokens carry resource-level scopes and can be revoked immediately.
Layered role-based access control
Requests are checked against authorizers for users, organizations, projects, datasets, and integrations.
Encrypted integration credentials
OAuth tokens and API keys are encrypted with per-dataset keys and refreshed through the upstream provider.
SSO supported
Single sign-on is supported for Enterprise customers — contact us to enable it.

Enterprise-grade Infrastructure

Infrastructure Security

Hardened, managed cloud infrastructure with continuous patching and least-privilege IAM.

Hardened compute
Workloads run on shielded, hardened nodes with integrity monitoring and automated security patching.
Federated identity
Services authenticate through federated identity. No long-lived credentials are stored on nodes.
Continuous posture scanning
Workloads and container images are continuously scanned for known vulnerabilities and misconfigurations.
Least-privilege IAM
Service accounts hold only the roles they need. No blanket project-level access.
Managed database with point-in-time recovery
Automated backups and point-in-time recovery on a managed database service.

Change Management

Change Management & Release Integrity

Changes to application and infrastructure code are reviewed, tracked, and reproducible.

Version-controlled infrastructure
Production infrastructure is defined as code. Changes are reviewed and tracked in git; environments are rebuilt from that code, never hand-tuned.
Signed container images
Container images for our code execution environment are cryptographically signed at build time and verified before deploy.

Audit Logs

Logging & Audit Trail

Requests, queries, and code executions are logged so we can reconstruct what happened, when, and on whose behalf.

Structured request logging
API calls are logged with full context for audit and incident review.
Query and execution audit
Queries and sandbox executions are logged with user context.
Distributed tracing
Requests are traced across services so we can follow the full path of any action.
Per-token usage tracking
API tokens record their last use, so stale ones are easy to find and revoke.
Security incident response
Production is monitored continuously with on-call alerting. If a security issue affects your data, we notify you.

Data Retention

Data Retention & Deletion

You control your data lifecycle. Retention and deletion follow the commitments in our privacy policy.

Customer-controlled deletion
Delete individual datasets, integrations, threads, and artifacts from the product at any time. Account deletion requests are honoured within 30 days per our privacy policy.
Complete dataset purge
Deleting a dataset is a hard delete — stored items, embeddings, analyses, and credentials are all removed.
Backup lifecycle
Deleted data clears from backups within the managed retention window.
Account-scoped conversation history
Conversations and AI interactions are stored only for the lifetime of your account.

Employee Access Controls

Employee Access Controls

Our team works under least-privilege access. Most employees never see customer data.

Minimal employee access
Employees only access systems required for their role.
Per-employee database credentials
Individual credentials ensure complete audit trails.
2FA enforced everywhere
Multi-factor authentication protects internal and third-party systems.

Compliance & Governance

Compliance & Governance

Formal attestations are in progress. The policies and commitments below are live today.

SOC 2 Type II
We're actively working on our SOC 2 Type II compliance.
HIPAA
We're actively working on our HIPAA compliance.
Privacy policy
See /privacy for details on data handling, sub-processors, and retention.
Terms of service
See /terms for commercial and usage obligations.
Responsible disclosure
Report security issues to [email protected]. We aim to acknowledge within one business day.

Plus the fundamentals

The basics you'd expect from any serious platform — we do these too.

TLS everywhere
TLS 1.2+ on every external endpoint and every service-to-service call.
Secrets in a managed vault
Production secrets live in a managed vault with IAM-controlled access.
Hashed API tokens
API tokens are stored as salted hashes; plaintext is shown once at creation.
Protected edge
The API is served through a managed global edge that absorbs attack traffic and keeps you connected.
Peer-reviewed code
Application and infrastructure changes are reviewed before merge and deployed through CI.
Per-token rate limiting
Per-token rate limits at the auth layer protect against brute-force and abuse.
OAuth state validation
OAuth flows validate single-use state parameters to prevent CSRF and replay.
Dependency scanning
Dependencies are checked for known vulnerabilities in CI.