Security Overview

Security Overview

Querio is serious about security and takes action to make sure your data stays safe.
Our approach is designed to give you peace of mind as you use Querio as your data co-pilot.

Commitment to Data Safety

Querio understands the critical importance of data security in today’s digital landscape. Our commitment to safeguarding your data is at the forefront of everything we do.

Our Comprehensive Security Approach

SOC 2 Type II Compliance

Querio meets the highest security standards with SOC 2 Type II compliance — independently audited to ensure strict controls around security, availability, and confidentiality.

Vulnerability Management

  • Ongoing internal vulnerability assessments

  • Dedicated team for rapid response

  • Web-based scanning and monitoring tools to detect and mitigate potential issues

Regular Auditing & Monitoring

We continuously audit, monitor, and review our architecture, codebase, and logs to maintain vigilant oversight and quickly respond to risks.

Secure Infrastructure

Querio runs on Amazon Web Services (AWS), a leader in secure cloud hosting and infrastructure.

Privacy Regulation Compliance

Querio adheres to CCPA and GDPR privacy standards. A Data Processing Agreement (DPA) is signed at onboarding to formalize our commitment.

Encryption Technologies

  • Data at rest is encrypted using AES-256

  • Data in transit is protected with HTTPS/TLS 1.3

These measures ensure protection both while stored and during communication.

Pursuit of Compliance Excellence

Querio is compliant with:

  • SOC 2 Type II

  • HIPAA

  • GDPR

These frameworks reflect an ongoing commitment to operational and security excellence.

Fine-Grained Access Controls

Role-based access and minimal permission settings ensure users only see data appropriate for their role.

Secure Connections

Secure connections utilize:

  • SSH tunneling

  • SSL/TLS encryption

  • IP whitelisting

  • HTTPS

These technologies protect data flows to and from data sources.

Data Retention & Storage

  • Customer data is not permanently retained

  • Temporary storage is limited to secure segments within the Virtual Private Cloud (VPC), or the customer’s own on-premise deployment if used

Personnel & Security Training

Querio’s security policies cover development practices, rigorous testing, and ongoing personnel training — including multi-factor authentication (2FA) and security best practices across teams.

Let your team and customers work with data directly

Let your team and customers work with data directly