Security & Compliance

Security is not an add-on. It's the foundation.

Your customers trust you with their data. We make sure that trust is well-placed — with encryption, access controls, audit trails, and governance built into every layer.

Security features

Enterprise-grade protection, SMB-friendly

Every Akwazi deployment includes these security features as standard — not upsells.

Encryption Everywhere

AES-256 encryption at rest for all stored data. TLS 1.3 for all data in transit. No exceptions.

SSO & Authentication

SAML 2.0 and OAuth 2.0 support. Integrate with Okta, Azure AD, Google Workspace, and more. MFA enforced.

Role-Based Access Control

Granular permissions at the module, action, and data level. Define roles that match your organization structure.

Comprehensive Audit Logs

Every action — human or AI — is logged with timestamps, actor identity, and context. Searchable and exportable.

Data Residency Options

Choose where your data is stored and processed. EU, US, or custom regions available on Enterprise plans.

Data Isolation

Strict tenant isolation ensures your data never mixes with other customers. Logical and physical separation options.

AI Governance

Configurable confidence thresholds, human-in-the-loop controls, and full transparency into AI decision-making.

Backup & Recovery

Automated daily backups with point-in-time recovery. RPO and RTO commitments available on Enterprise plans.

Compliance posture

How we approach compliance

We're transparent about where we are and where we're heading. No over-promising.

SOC 2 Aligned

In practice

Our infrastructure and processes are built on SOC 2 Type II principles. We follow the Trust Services Criteria for security, availability, and confidentiality.

GDPR Ready

Supported

Data Processing Agreements (DPAs) available. Right to deletion, data portability, and consent management built in.

Regular Penetration Testing

Ongoing

We conduct regular third-party penetration tests and vulnerability assessments. Results available under NDA.

Secure Development Lifecycle

Standard practice

Code reviews, dependency scanning, and automated security testing are part of every release cycle.

AI governance

Responsible AI by default

AI automation is powerful — but only when it's controlled. Here's how we keep your AI workflows safe and auditable.

Confidence thresholds

Set minimum confidence levels for AI actions. Below the threshold, tasks route to a human reviewer.

Decision transparency

Every AI decision includes reasoning, source data, and confidence scores — visible in the audit log.

Human-in-the-loop

Any workflow step can require human approval. You decide which actions the AI can take autonomously.

No training on your data

Your data is never used to train models. Period. Your business data stays your business data.

Have security questions?

We're happy to discuss our security posture in detail, share penetration test summaries under NDA, or walk through specific compliance requirements.

Talk to Our Security Team

Ready to give your customersa better experience?

Book a 30-minute demo. We'll show you exactly how Akwazi works for your use case — no slides, no fluff, just the product.

No commitment · No credit card · 30-minute call