Security Overview

Learn about Centrify's comprehensive approach to security.

Our Security Philosophy

At Centrify, security is a core principle that guides everything we do. We implement multiple layers of protection to safeguard your data and AI deployments, following industry best practices and maintaining compliance with relevant standards and regulations.

Security Architecture

Our security architecture is designed with defense in depth in mind, incorporating multiple layers of protection:

  • Infrastructure Security: Secure cloud infrastructure with network isolation, firewalls, and intrusion detection systems.
  • Application Security: Secure development practices, regular code reviews, and vulnerability scanning.
  • Data Security: Encryption for data in transit and at rest, secure key management, and data isolation.
  • Access Control: Strong authentication, role-based access control, and principle of least privilege.
  • Monitoring and Response: Continuous monitoring, logging, and incident response procedures.

Security Team

Our dedicated security team works continuously to maintain and improve our security posture. This includes:

  • Regular security assessments and penetration testing
  • Security incident response planning and drills
  • Security awareness training for all employees
  • Staying current with emerging threats and vulnerabilities

Security Certifications

Centrify maintains compliance with key security standards and certifications, including:

  • SOC 2 Type II
  • ISO 27001
  • GDPR compliance
  • HIPAA compliance (for eligible customers)