Data Protection
How Centrify protects your data throughout its lifecycle.
Overview
Data protection is a critical aspect of Centrify's security strategy. We implement comprehensive measures to protect your data at every stage of its lifecycle, from collection and processing to storage and deletion.
Data Encryption
- Encryption in Transit: All data transmitted between your systems and Centrify is encrypted using industry-standard TLS protocols.
- Encryption at Rest: All stored data is encrypted using AES-256 encryption, protecting it even if physical storage media is compromised.
- Key Management: Encryption keys are securely managed and regularly rotated according to industry best practices.
Data Isolation
We maintain strict isolation between customer data to prevent unauthorized access:
- Logical Separation: Customer data is logically separated within our systems to prevent cross-customer access.
- Access Controls: Fine-grained access controls ensure that only authorized personnel can access specific data.
- Tenant Isolation: For enterprise customers, we offer dedicated tenant options with enhanced isolation.
Data Retention and Deletion
- Configurable Retention: Set custom retention periods for different types of data based on your requirements.
- Secure Deletion: When data is deleted, it is securely wiped using methods that prevent recovery.
- Data Export: Export your data at any time in standard formats for portability and backup.
Data Processing
- Minimal Processing: We process only the data necessary to provide our services.
- Processing Controls: Configure how your data is processed with granular controls.
- Processing Transparency: Clear documentation of how data is processed and for what purposes.