Security Overview
Security Overview
Querio is serious about security and takes action to make sure your data stays safe.
Our approach is designed to give you peace of mind as you use Querio as your data co-pilot.
Commitment to Data Safety
Querio understands the critical importance of data security in today’s digital landscape. Our commitment to safeguarding your data is at the forefront of everything we do.
Our Comprehensive Security Approach
SOC 2 Type II Compliance
Querio meets the highest security standards with SOC 2 Type II compliance — independently audited to ensure strict controls around security, availability, and confidentiality.
Vulnerability Management
Ongoing internal vulnerability assessments
Dedicated team for rapid response
Web-based scanning and monitoring tools to detect and mitigate potential issues
Regular Auditing & Monitoring
We continuously audit, monitor, and review our architecture, codebase, and logs to maintain vigilant oversight and quickly respond to risks.
Secure Infrastructure
Querio runs on Amazon Web Services (AWS), a leader in secure cloud hosting and infrastructure.
Privacy Regulation Compliance
Querio adheres to CCPA and GDPR privacy standards. A Data Processing Agreement (DPA) is signed at onboarding to formalize our commitment.
Encryption Technologies
Data at rest is encrypted using AES-256
Data in transit is protected with HTTPS/TLS 1.3
These measures ensure protection both while stored and during communication.
Pursuit of Compliance Excellence
Querio is compliant with:
SOC 2 Type II
HIPAA
GDPR
These frameworks reflect an ongoing commitment to operational and security excellence.
Fine-Grained Access Controls
Role-based access and minimal permission settings ensure users only see data appropriate for their role.
Secure Connections
Secure connections utilize:
SSH tunneling
SSL/TLS encryption
IP whitelisting
HTTPS
These technologies protect data flows to and from data sources.
Data Retention & Storage
Customer data is not permanently retained
Temporary storage is limited to secure segments within the Virtual Private Cloud (VPC), or the customer’s own on-premise deployment if used
Personnel & Security Training
Querio’s security policies cover development practices, rigorous testing, and ongoing personnel training — including multi-factor authentication (2FA) and security best practices across teams.
