Security at Querri: Built on Trust, Designed for Protection

We safeguard your data with transparent, enterprise-grade security practices. Focus on insights without worrying about data loss, breaches, or misuse.

Compliance & Security

Our security practices allow you to focus on insights without worrying about data loss, breaches, or misuse.

SOC 2 Type II Certified
Enterprise Encryption
Zero Data Training
24/7 Monitoring
Learn More
SOC 2 Type II Compliant Badge

Independently Verified

Annual compliance audits ensure
your data stays protected

How we protect your information

Your data is yours - we never use your data to train AI

Your data stays private. No information is shared between customers. Everything remains isolated, keeping your business confidential.

Your data is yours - we never use your data to train AI
Encryption & Key Management

Encryption & Key Management

We protect customer data using strong encryption protocols at rest and in transit. Keys are managed through AWS KMS and Azure Key Vault, with strict access controls to ensure decryption keys are never tied to user accounts. Each tenant can have its own key, adding an extra layer of security.

Granular Access Control

Access is granted based on the principle of least privilege through role-based access control (RBAC). Single sign-on (SSO), just-in-time credentials, and multi-factor authentication are integrated to ensure only the right people can access the right resources at the right time..

Granular Access Control
Isolation & Data Privacy

Isolation & Data Privacy

Our infrastructure is designed around isolated tenants, ensuring each project is its own secure boundary. By default, no access is allowed unless explicitly authorized, preventing data from crossing between tenants or accounts.

Encryption in Transit & at Rest

We adopt industry-standard cryptography, enforcing TLS for all data in motion and AES-256 encryption for data at rest. Load balancers automatically enforce HTTPS with the latest cipher suites, ensuring data confidentiality during transfer.

Encryption in Transit & at Rest
Compliance & Certifications

Compliance & Certifications

Querri is SOC 2 Type II certified, independently verifying the effectiveness of our controls over time. Our practices align with PCI-DSS, HIPAA, and ISO standards, and we continuously update them to meet evolving compliance needs.

Audit Logging & Monitoring

Every access and system change is tracked across multiple layers, including AWS CloudTrail, ELK logging, and Wazuh agents. Logs are tamper-resistant, centralized, and continuously monitored to detect anomalies or unauthorized behavior.

Audit Logging & Monitoring
"Security has been at the heart
of Querri from the first line
of code I wrote."
Dave Ingram, Querri Founder/CEO

More Questions? Check out our FAQs

Get insights in minutes.

Try for Free