Security

Learn about Centrify's security practices and how we protect your data.

Security Overview

Centrify is committed to maintaining the highest standards of security to protect your data and AI deployments:

  • End-to-end encryption for all data in transit and at rest
  • Regular security audits and penetration testing
  • Compliance with industry security standards
  • Secure development practices and code reviews

Data Protection

We implement multiple layers of protection for your data:

  • Data encryption using industry-standard algorithms
  • Secure key management
  • Regular backup procedures
  • Data isolation between customers
  • Strict access controls and audit logging

Compliance

Centrify maintains compliance with key security standards and regulations:

  • SOC 2 Type II
  • GDPR
  • HIPAA (for eligible customers)
  • ISO 27001

Security Best Practices

Recommendations for securing your Centrify deployments:

  • Implement strong authentication methods
  • Regularly rotate API keys and credentials
  • Apply the principle of least privilege for user access
  • Monitor usage and set up alerts for unusual activity
  • Keep your integrations and client libraries updated