Security at GraphNode
GraphNode adopts a security-first architecture with continuously reviewed practices to protect your data and our platform.
01
Infrastructure Security
Encryption at Rest
All data at rest is encrypted using AES-256 encryption. Database volumes, backups, and file storage are all encrypted with keys managed through a dedicated key management service.
Encryption in Transit
All communications between clients and our servers use TLS 1.3. We enforce HTTPS across all endpoints with HSTS headers and certificate transparency monitoring.
Tenant Isolation
Customer data receives logical segregation at the application layer with strict access controls preventing cross-tenant data leakage.
02
Authentication & Access
SSO & SAML 2.0
Enterprise customers can integrate their identity providers including Azure AD, Okta, and OneLogin for seamless single sign-on.
Multi-Factor Authentication
TOTP-based authenticator apps provide second-factor verification for all user accounts.
Session Management
Short-lived cryptographic tokens with automatic expiration and revocation capabilities. Inactive sessions terminate after configurable timeouts.
03
Compliance
Data processing agreements and subject rights support
04
Vulnerability Management
- Regular third-party penetration testing
- Automated dependency scanning in CI/CD pipelines
- Responsible disclosure program for security researchers
05
Data Handling
We follow minimal data collection practices with clear retention policies. Users have the right to request deletion of their data, which will be processed within 30 days.
06
Responsible Disclosure
If you discover a security vulnerability in our platform, we encourage you to report it responsibly.
Email: security@graphnodesoftware.com
Acknowledgment: Within 48 hours
Initial Assessment: Within 5 business days