Security & Compliance
SSO configuration, role-based access control, and compliance certifications.
Overview
Datawall is built with security at its core. We don't use external models or third-party APIs for processing your data — everything stays within your security perimeter. This page covers our security architecture, compliance certifications, and how to configure security features.
Data Security
Data Isolation
- All customer data is logically isolated
- No cross-tenant data access is possible
- Dedicated infrastructure available for enterprise customers
Encryption
- In Transit: TLS 1.3 for all connections
- At Rest: AES-256 encryption for stored data
- Key Management: Customer-managed keys available (Enterprise)
Data Residency
- US data centers (default)
- EU data centers available for GDPR compliance
- Custom regions available for enterprise customers
Single Sign-On (SSO)
Brend supports enterprise SSO for seamless, secure authentication.
Supported Protocols
- SAML 2.0 — Okta, Azure AD, OneLogin, Ping Identity
- OIDC — Google Workspace, Auth0, Keycloak
Configuring SAML SSO
- Go to Settings → Security → SSO
- Select SAML 2.0
- Enter your Identity Provider details:
- SSO URL
- Entity ID
- X.509 Certificate
- Download the Brend SP metadata for your IdP configuration
- Test the connection
- Enable SSO enforcement (optional)
Configuring OIDC SSO
- Go to Settings → Security → SSO
- Select OIDC
- Enter your provider details:
- Client ID
- Client Secret
- Discovery URL (or manual endpoint configuration)
- Configure redirect URIs in your IdP
- Test the connection
Role-Based Access Control (RBAC)
Define granular permissions at multiple levels:
Standard Roles
| Role | Permissions |
|---|---|
| Owner | Full access including billing and deletion |
| Admin | Manage team, settings, and all workflows |
| Editor | Create, edit, and deploy workflows |
| Viewer | Read-only access to workflows and reports |
Custom Roles (Enterprise)
Enterprise customers can create custom roles with specific permissions:
- Workflow permissions (create, edit, delete, deploy)
- Knowledge base permissions (view, edit, manage sources)
- Team permissions (invite, manage roles)
- Integration permissions (connect, configure)
- Audit log access
Audit Logging
Complete audit trail of all actions in your workspace:
- User Actions: Login, logout, password changes
- Workflow Actions: Create, edit, delete, deploy, run
- Data Access: Knowledge base queries and results
- Admin Actions: User management, settings changes
Log Retention
- Standard: 90 days
- Enterprise: 1 year (configurable up to 7 years)
Log Export
Export logs to your SIEM or log management system:
- API access to audit logs
- Webhook notifications for real-time events
- Integration with Splunk, Datadog, and other platforms
Compliance Certifications
| Certification | Status |
|---|---|
| SOC 2 Type II | Certified |
| GDPR | Compliant (DPA available) |
| HIPAA | Ready (BAA available for Enterprise) |
| ISO 27001 | In progress |
Request compliance documentation from your account manager or contact us.
Security Best Practices
- Enable SSO and disable password authentication
- Use the principle of least privilege for role assignments
- Regularly review audit logs and access permissions
- Enable multi-factor authentication for admin accounts
- Use environment variables for sensitive data in workflows
- Regularly rotate API keys and secrets