Security & compliance

Chartiin’s security model: SSO, policies, RLS, encryption, and auditability for enterprise compliance.

Authentication

Use your existing identity provider and lifecycle processes for access to Chartiin.

  • SSO via SAML, OIDC, or JWT‑based auth flows
  • SCIM or directory sync for provisioning and de‑provisioning
  • Support for MFA and step‑up auth enforced by your IdP

Authorization

Control which users can see which metrics, dashboards, and rows of data.

  • Role‑based access to workspaces, models, and dashboards
  • Attribute‑based policies for regions, teams, or tenants
  • Row‑level security enforced at query time in the semantic layer

Compliance

Technical and operational controls that support common compliance frameworks.

  • Encryption in transit (TLS) and at rest
  • Audit logs for access, configuration, and administrative actions
  • Change management and secure SDLC practices

Questions security teams often ask

Use this page alongside our privacy policy and whitepaper when working with risk or compliance reviewers.

Data boundaries

Where does data live and who can access it?

  • Whether data stays in your warehouse versus being cached
  • How production, staging, and sandbox environments are isolated

Identity & access

How does Chartiin integrate with existing identity providers?

  • Supported IdPs and SSO patterns
  • How least‑privilege roles and policies are implemented

Monitoring & incidents

What happens when something goes wrong?

  • Logging and alerting around auth, queries, and admin changes
  • Incident response, customer notifications, and remediation steps

Review our security with your team

We can walk your security team through our controls.