Trust is foundational. Orkyo is built from the ground up with security, privacy, and data isolation as core architectural principles.
Data Isolation Model
Complete Tenant Isolation
Every organization (tenant) has its data completely isolated at the database level. We use Row-Level Security (RLS) policies in PostgreSQL to ensure that data queries are automatically filtered by tenant ID.
Key isolation guarantees:
- Each tenant's data is stored in the same database but logically separated
- All database queries are automatically scoped to the authenticated tenant
- No tenant can ever access another tenant's data
- Tenant IDs are cryptographically verified in every request
Authentication Architecture
Orkyo uses Keycloak, an industry-standard identity and access management solution, to handle authentication and authorization.
- OpenID Connect (OIDC) authentication flow
- Multi-factor authentication (MFA) support
- Role-based access control (RBAC)
- SSO integration for enterprise customers
- Session management and automatic token refresh
Data Protection
Encryption
At Rest In TransitAll data is encrypted both at rest and in transit:
- Encryption at rest: Database and file storage use AES-256 encryption
- Encryption in transit: All connections use TLS 1.3
- HTTPS enforced on all endpoints
- Secure cookie flags (HttpOnly, Secure, SameSite)
Hosting & Infrastructure
Hosting Region: EU / GDPR-compliant data centers
Infrastructure security practices:
- Regular security patches and updates
- Automated vulnerability scanning
- Firewall protection and DDoS mitigation
- Monitoring and intrusion detection
- Regular backups with encrypted storage
Access Control
Role-Based Permissions
Orkyo implements granular access control within each tenant:
- Viewer: Read-only access to space data
- Planner: Create and manage space allocations
- Site Admin: Manage site settings and users
- Tenant Admin: Full access to tenant configuration
Audit Logging
All critical actions are logged for security and compliance:
- User authentication and authorization events
- Data modification tracking
- Administrative actions
- Failed access attempts
Compliance & Standards
Security Standards
Orkyo follows industry best practices and standards:
- OWASP Top 10 security guidelines
- GDPR compliance for EU data protection
- SOC 2 Type II compliance (in progress)
- Regular third-party security audits
Privacy Commitment
Your Data, Your Control
We never:
- Sell your data to third parties
- Use your production data for training or analytics
- Share data across tenants
- Access your data without explicit permission
You can:
- Export all your data at any time
- Delete your account and data permanently
- Control user access within your organization
- Request data processing agreements
Questions about security? Our team is happy to discuss our security architecture, provide additional documentation, or complete security questionnaires. Contact us.