How We Protect Your Data
Understanding how your data is protected helps you make informed decisions about using ABV in your security-sensitive applications.Encryption Throughout
Encryption Throughout
All data is encrypted both in transit and at rest using industry-standard protocols:
- In Transit: TLS (Transport Layer Security) for all network communications
- At Rest: AES-256 encryption for all stored data across databases, caches, and blob storage
Access Controls & Authentication
Access Controls & Authentication
We implement multiple layers of access control to ensure only authorized users can access your data:
- Enterprise SSO: OIDC-based single sign-on with providers like Okta and Azure AD
- Role-Based Access Control (RBAC): Granular permissions at organization and project levels
- SSO Enforcement: Optional requirement for domain-based SSO usage
- Multi-Factor Authentication: Additional security for sensitive operations
Regular Security Testing
Regular Security Testing
We don’t wait for security issues to find us—we actively hunt for them:
- Annual External Penetration Tests: Independent security experts simulate real-world attacks
- Vulnerability Management: Continuous scanning and rapid remediation
- ISO 27001 Audits: Annual third-party audits of our information security management system
Data Residency & Isolation
Data Residency & Isolation
Choose where your data lives and how it’s isolated:
- Regional Deployment: US (Virginia), EU (Ireland), and dedicated HIPAA regions
- Multi-Tenant SaaS: Secure isolation in shared infrastructure
- Single-Tenant Options: Dedicated environments for enterprise customers
Privacy-First Design
Privacy-First Design
We build privacy into every feature:
- Data Masking: Automatically redact sensitive information from traces
- Data Retention Controls: Configure how long data is stored
- Data Deletion: Delete specific traces, projects, or entire organizations
- Minimal Data Collection: We only collect what’s necessary for the service
Compliance Certifications
We maintain active compliance with industry-standard frameworks to meet your regulatory requirements.ISO 27001 Certified
ISO 27001 Certified
Our information security management system (ISMS) is certified to ISO 27001 standards, with annual third-party audits validating our security controls, risk management, and incident response processes.View ISO 27001 details
ISO 42001 Alignment
ISO 42001 Alignment
We align with ISO 42001, the international standard for AI management systems, ensuring responsible AI development, deployment, and governance.View ISO 42001 details
HIPAA Ready
HIPAA Ready
For healthcare organizations, ABV offers HIPAA-aligned infrastructure with Business Associate Agreements (BAA) to protect Protected Health Information (PHI).View HIPAA details
GDPR Compliant
GDPR Compliant
We comply with the General Data Protection Regulation (GDPR), offering data processing agreements (DPA) and comprehensive controls for managing personal data.View GDPR details
NIS2 Directive
NIS2 Directive
We align with the EU’s NIS2 Directive for network and information security, implementing comprehensive cybersecurity measures and incident reporting.View NIS2 details
Infrastructure & Deployment
Deployment Models
Choose the deployment model that fits your security and compliance requirements:| Model | Description | Best For |
|---|---|---|
| Multi-Tenant | Secure, isolated tenants in shared infrastructure | Most organizations—fast deployment, managed updates |
| Single-Tenant | Dedicated environment with isolated resources | Enterprise customers only |
Infrastructure Details
Cloud Provider: AWS and ClickHouse via AWS Regions:- US Region: us-east-1 (Virginia)
- EU Region: eu-west-1 (Ireland)
- HIPAA Region: Dedicated infrastructure for healthcare compliance
- Elasticache (Redis) - AES-256
- Aurora (PostgreSQL) - AES-256
- ClickHouse - AES-256
- S3 / Blob Storage - AES-256
Transparency & Reporting
We believe in security through transparency. We maintain clear channels for security reporting and provide visibility into our security practices.Responsible Disclosure Program
Responsible Disclosure Program
We welcome security researchers to help us identify and fix vulnerabilities. Our responsible disclosure program provides clear guidelines for reporting security issues confidentially.View our responsible disclosure policy
Incident Response
Incident Response
In the unlikely event of a security incident, we have a comprehensive incident response plan that includes:
- Immediate containment and investigation
- Customer notification within required timeframes
- Root cause analysis and remediation
- Post-incident review and improvements
Whistleblowing Channel
Whistleblowing Channel
We maintain a confidential whistleblowing channel for reporting concerns about security, privacy, ethics, or compliance.View whistleblowing information
Security Documentation
Security Documentation
We provide access to security documentation for customers:
- Penetration test reports (Pro/Enterprise)
- ISO 27001 certificates
- Data Processing Agreements
- Business Associate Agreements (HIPAA)