Security at Querri: Built on Trust, Designed for Protection
We safeguard your data with transparent, enterprise-grade security practices. Focus on insights without worrying about data loss, breaches, or misuse.
Compliance & Security
Our security practices allow you to focus on insights without worrying about data loss, breaches, or misuse.

Independently Verified
Annual compliance audits ensure
your data stays protected
How we protect your information
Your data is yours - we never use your data to train AI
Your data stays private. No information is shared between customers. Everything remains isolated, keeping your business confidential.


Encryption & Key Management
We protect customer data using strong encryption protocols at rest and in transit. Keys are managed through AWS KMS and Azure Key Vault, with strict access controls to ensure decryption keys are never tied to user accounts. Each tenant can have its own key, adding an extra layer of security.
Granular Access Control
Access is granted based on the principle of least privilege through role-based access control (RBAC). Single sign-on (SSO), just-in-time credentials, and multi-factor authentication are integrated to ensure only the right people can access the right resources at the right time..


Isolation & Data Privacy
Our infrastructure is designed around isolated tenants, ensuring each project is its own secure boundary. By default, no access is allowed unless explicitly authorized, preventing data from crossing between tenants or accounts.
Encryption in Transit & at Rest
We adopt industry-standard cryptography, enforcing TLS for all data in motion and AES-256 encryption for data at rest. Load balancers automatically enforce HTTPS with the latest cipher suites, ensuring data confidentiality during transfer.


Compliance & Certifications
Querri is SOC 2 Type II certified, independently verifying the effectiveness of our controls over time. Our practices align with PCI-DSS, HIPAA, and ISO standards, and we continuously update them to meet evolving compliance needs.
Audit Logging & Monitoring
Every access and system change is tracked across multiple layers, including AWS CloudTrail, ELK logging, and Wazuh agents. Logs are tamper-resistant, centralized, and continuously monitored to detect anomalies or unauthorized behavior.

"Security has been at the heartDave Ingram, Querri Founder/CEO
of Querri from the first line
of code I wrote."