What We Access
AnomalyArmor queries metadata and aggregate statistics only, never your actual row data. Every query is validated by our open-source Query Gateway before execution.| We Access | We Never Access |
|---|---|
| Table names | Row data |
| Column names | Actual values in columns |
| Data types | PII content |
| Timestamps (for freshness) | Query results |
| Row counts | Business-sensitive data |
| Constraint definitions | File contents |
The Queries We Run
During discovery, we query system catalogs:Freshness Monitoring
For freshness checks, we query the maximum value of your designated timestamp column:Data Storage
What We Store
| Data Type | Location | Encryption | Retention |
|---|---|---|---|
| Database credentials | AWS (encrypted) | AES-256-GCM | Until you delete |
| Schema metadata | AWS RDS | AES-256 | Account lifetime |
| Change history | AWS RDS | AES-256 | 90 days |
| Audit logs | AWS S3 | AES-256 | 1 year |
What We Don’t Store
- Your actual data values
- Query results beyond metadata
- Copies of your database
Data Flow
- Discovery engine connects via TLS 1.3
- Runs metadata queries against system catalogs
- Receives only schema information
- Stores encrypted in our infrastructure
- Your actual data never leaves your database
Compliance Implications
For GDPR
- We don’t process personal data (only metadata)
- DPA available if required
- Data deletion on account closure
For HIPAA
- No PHI accessed
- BAA available for healthcare customers
- Enhanced audit logging available
Verification
Want to verify what we access? You have multiple options:Check Your Database Logs
information_schema queries and timestamp aggregations.
Audit the Query Gateway
Our Query Gateway is open source. Your security team can:- Review the source code
- Run the 97+ security tests
- Verify exactly which queries are allowed at each access level
Common Questions
Can AnomalyArmor employees see my data?
Can AnomalyArmor employees see my data?
No. We can’t see your data because we never access it. Support staff can see metadata (table names, column names) to help troubleshoot, but never actual data values.
What if I have a column named 'password'?
What if I have a column named 'password'?
We see the column name “password” exists and its data type (e.g., varchar). We never see the actual password values stored in that column.
How do I know you're not lying?
How do I know you're not lying?
- Audit our open-source Query Gateway
- Check your database query logs
- Use a read-only database user with only
SELECTon system catalogs - Run a network packet capture during discovery
See Also
Query Gateway
Open-source SQL security layer
Security Overview
Full security documentation
Data Retention
How long we keep data
