Security at Narrativ
We take security seriously. Your data is protected by industry-leading security practices and infrastructure.
End-to-End Encryption
All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption.
Secure Authentication
Multi-factor authentication, OAuth 2.0 integration, and secure API key management.
Infrastructure Security
Hosted on SOC 2 compliant cloud infrastructure with isolated environments.
Continuous Monitoring
24/7 security monitoring, intrusion detection, and automated threat response.
Our Security Commitment
At Narrativ, security is not just a feature—it's foundational to everything we build. We implement comprehensive security measures across our entire platform to protect your data, your users, and your business.
Data Protection
Encryption
- In Transit: All data transmitted between your systems and our servers is encrypted using TLS 1.3
- At Rest: All stored data is encrypted using AES-256 encryption
- API Keys: Securely hashed and stored with industry-standard algorithms
Access Controls
- Role-based access control (RBAC) for team members
- Principle of least privilege applied across all systems
- Regular access reviews and automatic session timeouts
Infrastructure Security
- Cloud Provider: Hosted on enterprise-grade cloud infrastructure with SOC 2 Type II certification
- Network Security: Web Application Firewall (WAF), DDoS protection, and network segmentation
- Redundancy: Multi-region deployment with automatic failover capabilities
- Backups: Automated daily backups with point-in-time recovery
Application Security
- Secure Development: Security-first development practices with code reviews
- Dependency Scanning: Automated vulnerability scanning of all dependencies
- Penetration Testing: Regular third-party security assessments
- Bug Bounty: Responsible disclosure program for security researchers
Compliance & Certifications
SOC 2 Type II
Compliant
GDPR
Compliant
CCPA
Compliant
Incident Response
We maintain a comprehensive incident response plan that includes:
- 24/7 security monitoring and alerting
- Defined escalation procedures and response times
- Post-incident analysis and remediation
- Timely notification to affected parties as required by law
Report a Vulnerability
If you discover a security vulnerability, please report it responsibly.
Email: security@narrativ.tech
We appreciate the security community's efforts and will acknowledge valid reports within 48 hours.
Contact Security Team
For security-related inquiries or concerns, please contact us:
- Security Team: security@narrativ.tech
- Privacy Team: privacy@narrativ.tech
Last updated: December 8, 2024. We continuously improve our security practices and will update this page accordingly.