Security at Spice AI
%20(1).png)
.png)
Built on Principles
Our principles form the solid foundation of Spice AI’s security, guiding every decision and action we make.
.png)
Compliance
Certified compliance with industry standards including SOC 2 Type II.
.png)
Secure-Access-Control
All Spice AI systems are protected by Secure-Access-Controls including Authentication (AuthN), Authorization (AuthZ), and RBAC (Role-Based-Access-Control).
.png)
Data Protection
All secret and sensitive information is encrypted in-transit and at-rest.
.png)
Multi-Factor-Authentication (MFA)
All authentication systems require and enforce Multi-Factor-Authentication (MFA).
.png)
Least Privilege
Least-Privilege-Access is employed so that users, employees, and contractors do not have greater access than necessary.
.png)
Defense-in-Depth
Multiple security controls in depth.
.png)
Auditable
Access and usage are logged and auditable.
.png)
Secure Code
Code is scanned and tested for secrets and vulnerabilities.
.png)
Just-In-Time Access
Access is given only when it's required.