Skip to main content

Security and privacy

Controls

  • SSO and SCIM provisioning
  • Encryption at rest and in transit
  • Data residency and retention policies
  • Full audit logs for escalations and access