Security
  • 1 Minute to read
  • Dark
    Light
  • PDF

Security

  • Dark
    Light
  • PDF

Article summary

Compliance

Rivery complies with global security standards such as SOC 2 Type II, GDPR, and CCPA, ensuring data privacy and secure handling of user information.

Architecture

The platform employs a serverless architecture, enhancing scalability and reducing risks associated with server management. Data is transmitted securely using encrypted channels, ensuring protection during transit.

Access Methods

To enhance security, Rivery provides multiple secure access options:

  • VPN Integration: Enables secure access from corporate networks.
  • SSL Connections: Ensures encrypted communications.
  • SSH Tunnels and Reverse SSH Tunnels: Offer additional layers of secure connectivity for specific use cases.
  • Private Link (AWS, Azure, Google): Securely connects Rivery to services likeGoogle and Amazon Redshift, bypassing public internet exposure.

Single Sign-On (SSO)

Rivery supports SSO integration with major identity providers, including:

  • Microsoft Entra ID (Azure Active Directory): Allows seamless authentication for enterprise users.
  • Google Workspace: Ensures smooth access management for Google-based systems.
  • Okta: Facilitates identity management and secure authentication processes.

Permissions

The platform supports role-based access control (RBAC), allowing admins to grant granular permissions to users and teams. This ensures only authorized personnel can access sensitive data and perform specific operations.

Security Practices

The platform adheres to robust security practices, including periodic audits, penetration testing, and real-time monitoring, to prevent and mitigate potential security threats.

Data Retention and Encryption

  • Data Retention: Logs and other operational data are stored for a specified retention period for auditing and debugging purposes.
  • Encryption: All data at rest and in transit is encrypted using advanced encryption standards (e.g., AES-256).
  • Data Pipeline Regions: Rivery operates across multiple regions to ensure data localization and compliance with jurisdictional requirements.

Security FAQ and Support

A dedicated FAQ section addresses common security concerns, and support teams are available to handle specific queries or incidents promptly.

These security measures ensure Rivery users can confidently manage and integrate their data while adhering to best-in-class security protocols.


What's Next