Security at Spice AI
%20(1).png)
.png)
Built on Principles
Our principles form the solid foundation of Spice AI’s security, guiding every decision and action we make.
.png)
Compliance
Certified compliance with industry standards including SOC 2.
.png)
Secure-Access-Control
All Spice AI systems are protected by Secure-Access-Controls including Authentication (AuthN), Authorization (AuthZ), and RBAC (Role-Based-Access-Control).
.png)
Data Protection
All secret and sensitive information is encrypted in-transit and at-rest.
.png)
Multi-Factor-Authentication (MFA)
All authentication systems require and enforce Multi-Factor-Authentication (MFA).
.png)
Least Privilege
Least-Privilege-Access is employed so that users, employees, and contractors do not have greater access than necessary.
.png)
Defense-in-Depth
Multiple security controls in depth.
.png)
Auditable
Access and usage are logged and auditable.
.png)
Secure Code
Code is scanned and tested for secrets and vulnerabilities.
.png)
Just-In-Time Access
Access is given only when it's required.