Contact Us
Security

Built secure
from the ground up

Enterprise-grade encryption, strict access controls, and continuous monitoring · so your data and your customers' data stays protected.

Core Principles

Security in every layer

NIVA's architecture applies security controls at the infrastructure, application, and data layer simultaneously.

Encryption at Rest & in Transit

All data encrypted with AES-256 at rest. TLS 1.3 enforced for all connections. Keys rotated automatically on a defined schedule.

Zero-Trust Access

Role-based access control (RBAC) with least-privilege enforcement. Every internal service-to-service call is authenticated and logged.

Continuous Monitoring

Real-time threat detection, anomaly alerts, and audit logging for every action taken within the platform · admin or API.

Secure Cloud Infrastructure

Deployed on SOC 2 certified cloud providers. Network segmentation, WAF, and DDoS protection applied at the perimeter.

Secure Development

SAST/DAST scans in CI/CD pipeline. Dependency vulnerability scanning on every build. Security reviews for all major releases.

Incident Response

Documented IR playbooks, defined SLAs for severity classification, and coordinated disclosure policy for responsible vulnerability reporting.

Compliance

Built to meet regulatory standards

NIVA aligns with leading global compliance frameworks so your deployment meets the bar for regulated industries.

GDPR Compliant

Data subject rights, DPA available, EU data residency options, and lawful basis controls.

SOC 2 Type II Ready

Audit controls, access management, and operational procedures aligned to AICPA Trust Service Criteria.

HIPAA Aligned

Technical safeguards, audit controls, and BAA available for healthcare deployments.

ISO 27001 Ready

Information security management controls aligned to ISO/IEC 27001 annex requirements.

Data Practices

How we handle your data

Data Isolation

Each workspace is logically isolated. Multi-tenant architecture ensures no cross-tenant data leakage at the storage or query layer.

Retention & Deletion

Configurable retention policies per workspace. Data deletion requests honored within 30 days, with cryptographic erasure confirmation.

Data Residency

Enterprise plans support regional data residency. Choose where your conversation and model data is stored and processed.

Third-Party Subprocessors

Full subprocessor list available on request. All subprocessors undergo security review and are contractually bound to data protection obligations.

Data in transit TLS 1.3
Data at rest AES-256
Key management Auto-rotate
Audit logs Immutable
Access control RBAC + MFA
Threat detection Real-time
Backups Daily + encrypted
Infrastructure

Reliable, hardened, and audited

Tier-1 Cloud Providers

Deployed on AWS and GCP data centers with physical access controls, environmental safeguards, and 24/7 on-site security.

Network Segmentation

Private VPCs, subnet isolation, and strict firewall rules. No public exposure of internal services or databases.

DDoS & WAF

Layer 3/4 and layer 7 DDoS mitigation active at all edge locations. Web Application Firewall blocks OWASP Top 10 attack patterns.

Penetration Testing

Annual third-party penetration tests. Findings triaged and remediated within defined SLAs based on severity classification.

99.9% SLA Uptime

Multi-region failover, automated health checks, and self-healing infrastructure to meet enterprise availability requirements.

Change Management

All infrastructure changes tracked, reviewed, and require approval before production deployment. Full rollback capability.

Questions about security?

Talk to our security team or request our full security documentation and compliance reports.

Contact Security Team → View Trust Center