Security and privacy, built for regulated energy data.
Utilities and enterprises trust Gridleaf with sensitive grid, siting, and market data. Independent attestations, layered controls, and evidence for every claim on this page.
Third parties have looked under the hood.
SOC 2 Type 1
AttestedIndependent attestation against AICPA Trust Services Criteria — security, availability, and confidentiality.
VAPT Certification
CertifiedIndependent Vulnerability Assessment and Penetration Testing across platform, APIs, and MCP surface.
Aligned Frameworks
MappedControls mapped to NIST CSF, ISO/IEC 27001 Annex A, and CIS Controls v8.
Four principles behind every control.
Defense in depth
Layered controls across network, identity, application, and data — no single point of failure.
Least privilege
Production access is gated, time-bound, and logged. No standing credentials to customer data.
Your data stays yours
Never sold. Never used to train generalized AI models without explicit written consent.
Evidence over assertion
Every control is backed by auditable evidence and third-party reports.
Segmented, observable, recoverable.
WAF-protected edge · authenticated identity plane · tenant-scoped services · encrypted, multi-AZ data. Admin systems on a segmented network with hardware MFA.
How we protect your data, end to end.
Encryption
- TLS 1.2+ in transit; HSTS preloaded.
- AES-256 at rest across databases, object storage, and backups.
- Per-tenant row-level isolation; CMEK available for enterprise.
Identity & access
- SSO via OIDC and SAML 2.0 (Okta, Azure AD, Google Workspace).
- MFA required for all admin and production-privileged accounts.
- RBAC with scoped API keys; SCIM provisioning for enterprise.
Infrastructure
- Hosted on SOC 2 / ISO 27001 certified US cloud providers.
- Infrastructure-as-code with peer-reviewed, immutable deploys.
- Hardened container images with CVE scanning on every build.
Network & perimeter
- WAF, rate limiting, and bot protection on all public endpoints.
- Private networking between tiers; databases have no public ingress.
- DDoS protection via upstream CDN and cloud-native mitigations.
Secure development
- Mandatory peer review; protected branches and signed commits.
- SAST, SCA, and secret scanning on every pull request.
- Threat modeling for new services and architectural changes.
Monitoring & detection
- Tamper-evident audit logs for auth, authz, and data access.
- Anomaly monitoring for API abuse and privilege escalation.
- On-call engineering with defined SLAs for security events.
Incident response
- Documented IR plan with defined severities and roles.
- Customer notification within 72 hours per GDPR / DPDP guidance.
- Post-incident reviews shared with affected customers under NDA.
Vulnerability management
- Third-party VAPT by BlueTeamers; remediation SLAs by severity.
- Continuous internal scanning across infra and app layers.
- Responsible disclosure at security@gridleaf.org with safe harbor.
Data handling & isolation
- Logical tenant isolation — no commingling across customers.
- Three-tier classification: Public, Confidential, Critical Infrastructure.
- Configurable retention; deletion within 30 days of verified request.
AI & model governance
- No training on customer data without explicit written consent.
- Advisory outputs — decision-support, never autonomous control.
- Prompt and output logs scoped and retained per tenant controls.
Continuity & resilience
- Automated encrypted backups with periodic restore testing.
- Defined RPO / RTO targets and tested DR runbooks.
- Multi-AZ deployments for primary data plane services.
Vendor & subprocessor
- Security and privacy review before any subprocessor onboards.
- Subprocessor list available on request; updated on material change.
- DPAs with SCCs available for EU and UK customers.
Where we stand on the frameworks you care about.
Artifacts available for review.
Request under NDA. Vendor questionnaires turned around in five business days.
Responsible disclosure
Found a vulnerability? Test only accounts you own, avoid unnecessary data access, and give us a window to remediate before public disclosure. Good-faith research gets safe harbor.
security@gridleaf.orgWorking with your security team
Vendor questionnaires (SIG, CAIQ), DPAs, and architecture reviews with CISO and procurement teams.
Summary only. Authoritative terms live in your MSA, DPA, and exhibits.