Core Security Principles
Metadata Only, Never Your Data
The most important security control is what we don’t access:| We Access | We Never Access |
|---|---|
| Table names | Row data |
| Column names and types | Actual values |
| Schema metadata | PII content |
| Timestamp values (for freshness) | Business-sensitive data |
| Constraint definitions | Query results |
information_schema, pg_catalog, etc.), never your actual tables.
Defense in Depth
Security is implemented at every layer:Compliance & Certifications
GDPR Compliance
For customers in the EU or handling EU data:- Data Processing Agreement (DPA) available
- Right to erasure supported
- Data portability supported
- EU data residency options (contact sales)
HIPAA Readiness
For healthcare organizations:- Business Associate Agreement (BAA) available
- Enhanced audit logging
- Contact us for healthcare-specific deployment options
Encryption
Data in Transit
All network traffic uses TLS 1.3 encryption:- Database connections from AnomalyArmor to your infrastructure
- Web traffic to the AnomalyArmor dashboard
- API calls to AnomalyArmor services
- Webhook deliveries to your endpoints
Data at Rest
All stored data is encrypted with AES-256:| Data Type | Encryption | Key Management |
|---|---|---|
| Database credentials | AES-256-GCM | AWS KMS, automatic rotation |
| Asset metadata | AES-256 | Managed by infrastructure |
| Audit logs | AES-256 | Immutable storage |
| Backups | AES-256 | Separate backup keys |
Key Management
Encryption keys are managed through AWS KMS:- Automatic key rotation every 365 days
- Keys never leave the KMS boundary
- Separate keys per customer (Enterprise)
- Hardware Security Module (HSM) backed
Network Security
Connection Architecture
AnomalyArmor connects outbound to your databases:IP Allowlisting
AnomalyArmor uses static IP addresses for database connections:Contact support for the current list of IP addresses, or view them in Settings → Security in your dashboard.
VPC Peering (Enterprise)
For enhanced network isolation:- Direct VPC peering between your AWS account and AnomalyArmor
- No public internet exposure for database connections
- Private DNS resolution
AWS PrivateLink (Enterprise)
Connect via AWS PrivateLink for:- Fully private connectivity
- No data traversing public internet
- Simplified firewall rules
Authentication & Access Control
User Authentication
AnomalyArmor supports multiple authentication methods:| Method | Availability | Details |
|---|---|---|
| Email + Password | All plans | Strong password requirements |
| Google SSO | All plans | OAuth 2.0 integration |
| SAML 2.0 SSO | Enterprise | Okta, Azure AD, OneLogin, etc. |
| Multi-Factor Auth | All plans | TOTP-based (Google Authenticator, etc.) |
Role-Based Access Control (RBAC)
Control who can do what:| Role | Permissions |
|---|---|
| Viewer | View assets, alerts, dashboards |
| Editor | Viewer + configure alerts, manage destinations |
| Admin | Editor + manage data sources, team members |
| Owner | Admin + billing, security settings |
Session Security
- Session tokens expire after 24 hours of inactivity
- Sessions invalidated on password change
- Concurrent session limits (Enterprise)
- IP-based session restrictions (Enterprise)
Credential Security
How We Store Your Database Credentials
Database credentials are the most sensitive data we handle:- Encryption: AES-256-GCM with customer-specific keys
- Key storage: AWS KMS with HSM backing
- Access logging: Every credential access is logged
- Least privilege: Only the discovery engine accesses credentials
- No visibility: Support staff cannot view your credentials
Credential Recommendations
Recommended setup for PostgreSQL:Audit Logging
What We Log
Every significant action is logged:| Event Type | Details Logged |
|---|---|
| Authentication | Login, logout, failed attempts, MFA events |
| Data access | Discovery runs, asset views, exports |
| Configuration | Rule changes, destination updates, team changes |
| Admin actions | User management, security settings |
Log Retention
- Standard: 90 days retention
- Enterprise: Configurable retention, SIEM integration
Accessing Audit Logs
Navigate to Settings → Audit Log to view activity:- Filter by user, action type, date range
- Export to CSV
- API access for SIEM integration (Enterprise)
Infrastructure Security
Cloud Provider
AnomalyArmor runs on AWS with:- Multi-AZ deployment for high availability
- Automated backups with point-in-time recovery
- DDoS protection via AWS Shield
- Web Application Firewall (WAF)
Host Security
- Hardened AMIs with minimal attack surface
- Automatic security patching
- No SSH access to production hosts
- Immutable infrastructure (replaced, not updated)
Container Security
- Non-root container execution
- Read-only file systems where possible
- Resource limits enforced
- Regular vulnerability scanning
Incident Response
Our Commitment
In the event of a security incident:- Detection: 24/7 monitoring with automated alerting
- Response: Incident response team engaged within 1 hour
- Communication: Affected customers notified within 24 hours
- Resolution: Root cause analysis and remediation
- Post-mortem: Detailed report shared with affected customers
Reporting Security Issues
If you discover a security vulnerability:- Email: security@anomalyarmor.ai
- Response time: Within 24 hours
- Bug bounty: Contact us for details
Penetration Testing
Our Testing
- Annual third-party penetration tests
- Continuous automated vulnerability scanning
- Bug bounty program for responsible disclosure
Your Testing
Enterprise customers may conduct penetration testing:- Contact us at least 2 weeks in advance
- Scope limited to your tenant
- Provide test dates and methodology
- Share findings for mutual benefit
Security FAQ
Can AnomalyArmor employees see my data?
Can AnomalyArmor employees see my data?
No. Employees cannot access customer credentials or metadata. All access is logged and audited. Support debugging happens with synthetic data only.
What happens if AnomalyArmor is breached?
What happens if AnomalyArmor is breached?
Your database credentials are encrypted with customer-specific keys. Even in a breach, credentials cannot be decrypted without the KMS keys. We would notify you within 24 hours of any confirmed breach.
Can I run AnomalyArmor in my own cloud?
Can I run AnomalyArmor in my own cloud?
Self-hosted deployments are available for Enterprise customers with specific compliance requirements. Contact sales for details.
How do I revoke AnomalyArmor's access?
How do I revoke AnomalyArmor's access?
- Delete the data source connection in AnomalyArmor
- Revoke the database user’s permissions or delete the user
- Remove AnomalyArmor IPs from your security group
Related Pages
Query Gateway
Open-source SQL security layer
Data Handling
What data we access and how we handle it
Data Retention
How long we keep your data
