Continual conforms to your underlying data warehouse security policies
Features and predictions generated by Continual are stored in your cloud data warehouse
Customer data is never persisted on the Continual platform
A Data Process Addendum available upon request.
Continual requires user and role-based authentication for data warehouse access and creates full audit logs for every action taken
By avoiding data replication, Continual conforms seamlessly to your data warehouse security policies, audit capabilities, and usage limits
Continual is limited to write access to a dedicated database and read access into relevant source tables, and can be further isolated in implementation
Every action in Continual has an associated audit event
Continual runs on Google Cloud Platform in an isolated production VPC and adopts industry best practices for physical, virtual, and network-level security
Continual’s metadata database (Google Cloud SQL) is encrypted by Google Cloud Platform using AES-256 encryption or higher, and all ingress and egress is encrypted via TLS 1.2+
Continual follows enterprise-grade best practices to protect our customers’ data including continuous security control monitoring with Drata, employee security training, security firm penetration testing, and secure software development practices.