Skip to main content

Security & Privacy

Iara Data is built with security and privacy at its core. This page explains how we protect your data and the measures in place.

Data Protection

Encryption

LayerProtection
In TransitAll communications use TLS 1.3 encryption (HTTPS)
At RestData stored in the data warehouse is encrypted using AES-256
API KeysHashed with bcrypt — we never store plain-text keys
PasswordsHashed with bcrypt + salt

Data Isolation

Each tenant's data is completely isolated through:

  • Separate database schemas per tenant
  • Separate data namespaces
  • Row-level security on shared tables
  • JWT tokens scoped to tenant ID

No tenant can ever access another tenant's data.

PII Protection

The platform automatically detects and protects personally identifiable information (PII):

Auto-Detection

PII TypeDetection Method
Email addressesPattern matching (user@domain.com)
Phone numbersInternational format patterns
CPFBrazilian individual tax ID (11 digits with check)
CNPJBrazilian company tax ID (14 digits with check)
Credit cardsLuhn algorithm validation

How PII Is Handled

  1. Detection — Columns are automatically flagged as PII during upload analysis
  2. Masking — PII values are masked in query results (e.g., j***@example.com)
  3. Manual Override — You can mark additional columns as PII in the dataset editor
  4. Audit Trail — All PII access is logged in the audit log

Screenshot showing a dataset with PII columns highlighted and masked values

Authentication & Authorization

Authentication Methods

MethodHow It Works
Email + PasswordStandard login via the web interface
Invitation LinksSecure token-based invite acceptance
API KeysBearer token authentication for programmatic access
SSO/SAMLAvailable on Business plan — federated authentication

Authorization

Access is controlled through:

  • Roles — Admin, Developer, Analyst, Billing (see Team & Roles)
  • Scopes — Fine-grained permissions (e.g., ingest:write, kpi:read)
  • Tenant isolation — JWT tokens enforce tenant boundaries

Idempotency & Data Integrity

All mutating API operations support idempotency keys to prevent duplicate operations. This ensures data integrity even during network retries.

Rate Limiting

API endpoints are rate-limited per plan to prevent abuse:

PlanRequests/minute
Free30
Starter60
Growth120
Business300

Rate-limited requests receive a 429 Too Many Requests response with X-RateLimit-Reset header indicating when to retry.

Audit & Compliance

  • Full audit logging of all significant actions (see Audit Log)
  • Immutable audit trail — records cannot be modified or deleted
  • LGPD/GDPR compliance — PII detection, masking, and data isolation
  • Data export — Users can export their data at any time

Infrastructure Security

MeasureDescription
Cloud hostingGCP (Google Cloud Platform) with regional data residency
Container isolationEach service runs in isolated containers
Network securityInternal services communicate over private VPCs
Dependency scanningAutomated vulnerability scanning of all dependencies
Secrets managementNo secrets in code — all via environment variables
info

Reporting vulnerabilities: If you discover a security issue, please email security@iaradata.com. We will investigate and respond within 24 hours.