Skip to main content

Security and privacy

Data scope

Users explicitly choose sources and time ranges for ingestion.

Access controls

Source access is permissioned and revocable.

Privacy posture

Local data remains local by default in self-hosted mode. Escalations are logged and auditable.