Security Practices

Diaflow is committed to protecting your data with enterprise-grade security. We are SOC 2 Type II certified, HIPAA compliant, and GDPR compliant, ensuring that your workflows, AI agents, and data meet the highest standards of security, availability, and privacy.

You can view our certifications and compliance status in real time on our Trust Portalarrow-up-right.

If you have additional questions regarding security, please contact [email protected]envelope and we will respond promptly.

1. Compliance & Certifications

View our live compliance status and request documentation via the Diaflow Trust Portalarrow-up-right.

SOC 2 Type II

Diaflow has achieved SOC 2 Type II certification, audited by an independent third-party firm. Unlike Type I (a point-in-time snapshot), SOC 2 Type II evaluates the operational effectiveness of our security controls over a continuous observation period (minimum 3 months). This certification covers the Trust Services Criteria for Security, Availability, and Confidentiality.

Our SOC 2 Type II report is available to customers and prospects under NDA. You can request a copy through our Trust Portalarrow-up-right or by contacting [email protected]envelope.

HIPAA

Diaflow is HIPAA compliant, enabling healthcare organizations and business associates to use our platform for workflows involving Protected Health Information (PHI). Our HIPAA program includes:

  • Administrative, technical, and physical safeguards aligned with the HIPAA Security Rule

  • Business Associate Agreements (BAAs) available for qualifying customers

  • Encryption of PHI both in transit (TLS 1.2+) and at rest (AES-256)

  • Access controls and audit logging for all PHI interactions

  • Workforce training on HIPAA requirements

  • Incident response procedures specific to PHI breaches

GDPR

Diaflow is fully compliant with the General Data Protection Regulation (GDPR). We serve as a Data Processor on behalf of our customers (Data Controllers) and uphold the following commitments:

  • Lawful Basis for Processing: We process personal data only as instructed by our customers

  • Data Processing Agreement (DPA): Available to all customers upon request

  • Data Subject Rights: We support customers in fulfilling data subject access, rectification, erasure, and portability requests

  • Cross-Border Data Transfers: Transfers outside the EEA are governed by Standard Contractual Clauses (SCCs) or equivalent safeguards

  • Data Protection Officer: Designated contact for GDPR-related inquiries

  • Breach Notification: We notify affected customers within 72 hours of becoming aware of a personal data breach, in line with Article 33

2. Hosting, Architecture & Infrastructure

Cloud Infrastructure

Diaflow's cloud-based services run on a multi-tenant architecture hosted by Amazon Web Services (AWS). Our infrastructure is designed to segregate and restrict access to customer workspaces, workflows, and AI agent configurations. AWS provides foundational security controls, and information about their security posture is available at the AWS Security websitearrow-up-right and AWS Compliance websitearrow-up-right.

Key infrastructure controls include:

  • Multi-availability zone deployments for high availability

  • Virtual private cloud (VPC) isolation with strict network segmentation

  • Infrastructure-as-code for consistent, auditable environment provisioning

  • Immutable infrastructure patterns to reduce configuration drift

Database, Query & Workflow Configurations

You and your users may submit data and content to your Workspace — for example by querying a database, configuring AI agents, or automating workflows. You have the option to build and use Workspaces without connecting them to any external database, or alternatively, connect to your own databases, third-party databases, or databases hosted by Diaflow.

Storage of Data

When you connect a Workspace to a Diaflow-hosted database, your data is stored using AWS infrastructure with encryption at rest. When you connect to your own database or a third party's, Diaflow may or may not store your databut rather proxies requests and applies credentials server-side. This architecture prevents end-user browsers from requiring direct database access, eliminating the need to provision individual user credentials and reducing credential exposure risk.

When query or workflow caching is enabled, Diaflow temporarily stores data for the cache duration you configure. You can clear the cache or disable caching entirely at any time.

3. Confidentiality & Security Controls

Confidentiality

Diaflow enforces strict controls over employee access to customer Workspaces and associated data. Access is limited to personnel who require it for operational purposes (e.g., troubleshooting a reported issue), and all such access is subject to:

  • Principle of least privilege enforcement

  • Role-based access controls (RBAC)

  • Comprehensive audit logging of all access events

  • Mandatory confidentiality agreements for all employees and contractors

Data Encryption

Diaflow uses industry-standard encryption for data protection:

  • In Transit: TLS 1.2 or higher for all data transmissions. We support the latest recommended cipher suites and actively deprecate weak protocols.

  • At Rest: AES-256 encryption for all stored data, including database backups and logs.

  • Encryption keys are managed through AWS Key Management Service (KMS) with automatic key rotation.

Access Management

  • Multi-Factor Authentication (MFA): Required for all Diaflow internal systems and available for customer accounts.

  • Single Sign-On (SSO): Enterprise SSO via SAML 2.0 and OpenID Connect.

  • Session Management: Configurable session timeout policies and the ability for administrators to remotely revoke user sessions.

  • Granular Permissions: Role-based access controls enabling administrators to define precise access levels per user or team.

Network Security

  • Firewalls configured per industry best practices using AWS Security Groups

  • Network segmentation between production, staging, and development environments

  • Real-time intrusion detection and prevention systems (IDS/IPS)

  • DDoS protection via AWS Shield

  • All server access requires two-factor authentication

  • Continuous network monitoring and alerting 24/7

Host & Endpoint Security

  • Automated vulnerability scanning and malware detection on all production hosts and employee endpoints

  • Mandatory full disk encryption on all company devices

  • Enforced screen lock policies

  • Centralized endpoint management with remote wipe capabilities

  • Prompt triage and remediation of identified vulnerabilities

Application Security

  • Security review process for all new features, significant functionality changes, and design modifications

  • Automated static analysis (SAST) and dynamic analysis (DAST) integrated into the CI/CD pipeline

  • Mandatory peer code review before production deployment

  • Regular penetration testing by external security firms

  • Dependency vulnerability scanning with automated alerts

  • Security bug bounty program enabling security researchers worldwide to report vulnerabilities

AI-Specific Security Controls

Given Diaflow's AI-native architecture, we implement additional controls specific to AI and agentic workflows:

  • Model Data Isolation: Customer data used within AI agent workflows is logically isolated and not used to train models for other customers

  • Prompt & Output Logging: Configurable audit trails for AI agent interactions, supporting compliance requirements

  • Third-Party LLM Governance: When workflows connect to third-party LLM providers, Diaflow enforces data handling policies and supports customer-managed API keys to maintain data sovereignty

  • Agent Permission Boundaries: AI agents operate within defined permission scopes set by workspace administrators

4. Business Continuity & Disaster Recovery

Reliability & Availability

Diaflow is designed for high availability with fault-tolerant infrastructure across multiple AWS Availability Zones. Our operations team maintains 24/7 on-call coverage and regularly tests disaster recovery procedures.

  • Uptime Target: 99.9% availability SLA for enterprise plans

  • Automated Failover: Multi-AZ deployment ensures automatic failover in case of infrastructure failure

  • Regular DR Testing: Disaster recovery plans are tested at least quarterly

Backup & Recovery

  • Automated daily backups of all customer data, Workspaces, and source code

  • Backups stored redundantly across multiple geographic locations

  • 7-day backup retention with the ability to restore from any point

  • Backup integrity verified through full restoration testing at least every 90 days

  • Recovery Time Objective (RTO) and Recovery Point Objective (RPO) documented and tested

5. Incident Management

Diaflow maintains comprehensive security incident management policies and procedures, aligned with SOC 2, HIPAA, and GDPR requirements:

  • Detection: 24/7 automated monitoring with real-time alerting for anomalous or suspicious activity

  • Response: Defined incident response plan with escalation procedures and designated incident commanders

  • Notification: Customers are notified without undue delay of any unauthorized disclosure of their data, typically via email. For HIPAA-covered incidents, notification timelines comply with the Breach Notification Rule. For GDPR-covered incidents, notification occurs within 72 hours.

  • Post-Incident Review: Root cause analysis and corrective action plans documented for all material incidents

6. Monitoring, Auditing & Logging

Security Audits

Diaflow undergoes regular security assessments, including:

  • Annual SOC 2 Type II audits by independent third-party firms

  • Periodic penetration testing by external security consultants

  • Continuous automated scanning of our web platform and APIs

  • Internal security reviews facilitated by the security team

Intrusion Detection & Monitoring

  • All Diaflow services and endpoints are monitored continuously

  • Endpoint detection and response (EDR) with malware and anomaly detection

  • Cloud environment logs monitored and alerted 24/7

  • Manual log review at minimum every 90 days

  • Centralized logging environment capturing security, access, availability, and performance metrics

Audit Logging

Detailed audit logs are available on-demand for customer review, including:

  • Account sign-in events with device type and IP address

  • Workflow execution history

  • Data access and modification events

  • Administrative actions and permission changes

  • AI agent interaction logs (configurable)

7. Data Lifecycle Management

Data Portability

During the term of a subscription, administrators can import and export Workflows in JSON format. Technical constraints may apply to subsequent compatibility and utility.

Data Retention & Return

Within 30 days of contract termination, you may request the return of your Workspace data stored by Diaflow (to the extent not already deleted by you).

Data Deletion

Administrators can delete Workflows and all associated Workspace data at any time during the subscription term:

  • Hard Deletion: Within 24 hours of administrator-initiated deletion, data is removed from production systems

  • Backup Purge: Backups containing deleted data are destroyed within 30 days

  • GDPR Erasure: Deletion requests under GDPR Article 17 are processed within the same timelines

  • HIPAA Disposal: PHI is disposed of in accordance with HIPAA requirements, with documented verification

8. Personnel Security

Hiring & Training

  • Background checks conducted on all employees prior to employment

  • Comprehensive security and privacy training during onboarding

  • Annual security awareness training with specific modules for HIPAA and GDPR

  • All employees sign information security policies covering the security, availability, and confidentiality of Diaflow services

Acceptable Use & Access

  • Strict acceptable use policies for all systems and data

  • Access provisioned on a need-to-know basis with regular access reviews

  • Prompt deprovisioning upon role change or termination

  • Mandatory reporting of security incidents or suspected vulnerabilities

9. Subprocessors & Third Parties

Diaflow maintains a list of subprocessors that process customer data on our behalf. This list is available upon request and is updated in advance of any changes, with customers notified per the terms of our DPA.

All subprocessors are subject to:

  • Due diligence and security assessment prior to engagement

  • Contractual obligations for data protection aligned with SOC 2, HIPAA, and GDPR requirements

  • Periodic review and reassessment

10. Requesting Security Documentation

Contact [email protected]envelope or visit our Trust Portalarrow-up-right to submit your request.

Last updated