Security at Narrativ

We take security seriously. Your data is protected by industry-leading security practices and infrastructure.

End-to-End Encryption

All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption.

Secure Authentication

Multi-factor authentication, OAuth 2.0 integration, and secure API key management.

Infrastructure Security

Hosted on SOC 2 compliant cloud infrastructure with isolated environments.

Continuous Monitoring

24/7 security monitoring, intrusion detection, and automated threat response.

Our Security Commitment

At Narrativ, security is not just a feature—it's foundational to everything we build. We implement comprehensive security measures across our entire platform to protect your data, your users, and your business.

Data Protection

Encryption

  • In Transit: All data transmitted between your systems and our servers is encrypted using TLS 1.3
  • At Rest: All stored data is encrypted using AES-256 encryption
  • API Keys: Securely hashed and stored with industry-standard algorithms

Access Controls

  • Role-based access control (RBAC) for team members
  • Principle of least privilege applied across all systems
  • Regular access reviews and automatic session timeouts

Infrastructure Security

  • Cloud Provider: Hosted on enterprise-grade cloud infrastructure with SOC 2 Type II certification
  • Network Security: Web Application Firewall (WAF), DDoS protection, and network segmentation
  • Redundancy: Multi-region deployment with automatic failover capabilities
  • Backups: Automated daily backups with point-in-time recovery

Application Security

  • Secure Development: Security-first development practices with code reviews
  • Dependency Scanning: Automated vulnerability scanning of all dependencies
  • Penetration Testing: Regular third-party security assessments
  • Bug Bounty: Responsible disclosure program for security researchers

Compliance & Certifications

SOC 2 Type II

Compliant

GDPR

Compliant

CCPA

Compliant

Incident Response

We maintain a comprehensive incident response plan that includes:

  • 24/7 security monitoring and alerting
  • Defined escalation procedures and response times
  • Post-incident analysis and remediation
  • Timely notification to affected parties as required by law

Report a Vulnerability

If you discover a security vulnerability, please report it responsibly.

Email: security@narrativ.tech

We appreciate the security community's efforts and will acknowledge valid reports within 48 hours.

Contact Security Team

For security-related inquiries or concerns, please contact us:

  • Security Team: security@narrativ.tech
  • Privacy Team: privacy@narrativ.tech

Last updated: December 8, 2024. We continuously improve our security practices and will update this page accordingly.