Edilitics | Data to Decisions

Security & Governance

How Edilitics protects your data at rest, governs AI access, and gives your team full accountability over every action taken in the workspace.

Edilitics is built on two principles: your data stays yours, and every action is accountable. This section covers how data is protected at rest, how AI features are governed, and how your team maintains full visibility over what happens in the workspace.


What Edilitics Stores

Your underlying database or warehouse records are never stored on Edilitics infrastructure. What is stored is metadata, configuration, and conversation history, all encrypted before storage using per-workspace keys.

DataWhere it comes fromStored?
Connection credentialsIntegrate: database host, port, username, password, OAuth tokensStored, encrypted
Schema and column metadataIntegrate: table structure, column names, data types, DQ statistics, AI-generated column insightsStored, encrypted
Pipeline configurationTransform: operation sequence, source/destination mapping, schedule, compute settingsStored, encrypted
Transform run historyTransform: run status, phase timing, row counts, per-operation metrics, error logsStored, encrypted
AskEdi conversationsAskEdi: chat titles, prompt text, LLM replies, generated SQL, chart data, follow-up suggestions, runtime metricsStored, encrypted
Dashboard and chart configurationsVisualize: chart type, column mappings, filters, aggregations, sheet structure, external share tokensStored, encrypted
Transform sample snapshotTransform: a temporary 16,600-row preview snapshot used while configuring operationsTemporary, encrypted. Deleted on save or exit
Raw data rowsYour source tables and warehouse recordsNever stored

Encryption

All stored data is encrypted at rest using Fernet symmetric encryption with per-workspace keys derived via PBKDF2-HMAC-SHA256 (100,000 iterations). Each workspace key is derived from three independent inputs: a domain-level salt stored in GCS, a user-level salt stored in the database, and a common application key held in the server environment. All three must be present to derive the key. A compromised key from one workspace cannot decrypt data from any other.

See Data Encryption for the full breakdown.


Access Control

Every resource in Edilitics has an owner and an explicit share list. Access is never implicit.

ModuleWho can access
IntegrateThe user who created the integration (owner) and any users the owner explicitly shares it with. Workspace admins have access to all integrations in the organisation.
TransformThe pipeline owner and any users the owner shares it with by email. Shared users can view and run, but cannot edit, delete, duplicate, or reshare. Workspace admins have full access across all pipelines.
VisualizeThe dashboard owner and explicitly shared users. Dashboards can also be published via a shareable external link with an encrypted access token. Workspace admins have access to all dashboards.
AskEdiThe conversation owner and any users the owner explicitly shares it with (view-only). Shared viewers can read the conversation and download a PDF export but cannot continue the chat. Workspace admins have access to all conversations in the organisation.

AI Data Governance

Edilitics provides three privacy modes that control exactly what schema context is sent to an LLM when you use AskEdi, Visualize, or Integrate AI features. No raw data rows are ever sent in any mode.

The three modes are Private, Balanced, and Full Context. What each mode sends differs per module: Integrate, AskEdi, and Visualize each have their own payload toggles. Private mode is not "no context": it still sends structural metadata while protecting column identities. Full Context sends the most schema detail but never sends actual data rows.

See Privacy & Context Modes for the exact per-module breakdown of what each mode includes and excludes.


Audit Logs

Every action taken in the workspace is logged with the acting user, a timestamp, and a human-readable description. Logs are available to workspace admins and are exportable as CSV. Retention varies by plan, from 7 days on the evaluation plan up to 365 days on Team Pinnacle. Enterprise plans have a custom retention period.

See Audit Logs for the full list of tracked actions per module.


Bring Your Own Key (BYOK)

Workspace admins can configure API keys for OpenAI, Anthropic, or Google DeepMind at the organisation level. When a BYOK key is active, Edilitics routes all AI requests through that key: your quota, your provider account. Admins control which features use the key and can test connectivity before activating it.

By default, most AI providers log API requests and may use them to improve their models. Before activating a BYOK key in Edilitics, explicitly disable logging in your provider's dashboard. Each provider's policy differs: review it before use.

See Bring Your Own Key (BYOK) for setup instructions and provider-specific logging guidance.


File Upload Security

All files uploaded through Integrate are scanned for malicious content before processing and stored in an isolated bucket. Size limits are enforced per format. See Data Encryption: File Upload Security for the full format and size table.


In This Section

Need help? Email support@edilitics.com with your workspace, job ID, and context. We reply within one business day.

On this page