Data Protection

How Centrify protects your data throughout its lifecycle.

Overview

Data protection is a critical aspect of Centrify's security strategy. We implement comprehensive measures to protect your data at every stage of its lifecycle, from collection and processing to storage and deletion.

Data Encryption

  • Encryption in Transit: All data transmitted between your systems and Centrify is encrypted using industry-standard TLS protocols.
  • Encryption at Rest: All stored data is encrypted using AES-256 encryption, protecting it even if physical storage media is compromised.
  • Key Management: Encryption keys are securely managed and regularly rotated according to industry best practices.

Data Isolation

We maintain strict isolation between customer data to prevent unauthorized access:

  • Logical Separation: Customer data is logically separated within our systems to prevent cross-customer access.
  • Access Controls: Fine-grained access controls ensure that only authorized personnel can access specific data.
  • Tenant Isolation: For enterprise customers, we offer dedicated tenant options with enhanced isolation.

Data Retention and Deletion

  • Configurable Retention: Set custom retention periods for different types of data based on your requirements.
  • Secure Deletion: When data is deleted, it is securely wiped using methods that prevent recovery.
  • Data Export: Export your data at any time in standard formats for portability and backup.

Data Processing

  • Minimal Processing: We process only the data necessary to provide our services.
  • Processing Controls: Configure how your data is processed with granular controls.
  • Processing Transparency: Clear documentation of how data is processed and for what purposes.