Skip to main content
Doris processes sensitive sales conversations, deal data, and CRM information. We treat security as a core product requirement. This trust center provides a high-level overview of our security practices and is intended for general information only. Customer-specific commitments are governed by contract.

Security at a Glance

Infrastructure Security

Cloud-native architecture on Microsoft Azure with WAF, private networking, and edge protection.

Application Security

Authentication, rate limiting, input validation, and multi-tenant data isolation.

Data Protection

Encryption at rest, transport security, and managed key handling for core service data.

Compliance

GDPR-focused practices, sub-processor transparency, and assurance posture.

Incident Response

Customer notification, documented response procedures, and security event logging.

Security Practices

AreaStandard
Encryption at restEncryption is enabled for primary production data stores, with additional protections applied to selected sensitive credentials
Encryption in transitSupported service connections require TLS 1.2 or higher, with newer protocols used where available
Incident responseCustomer notification for confirmed notifiable incidents is handled in line with applicable law and contract terms
Data residencyPrimary hosting is in Microsoft Azure UK South, subject to service configuration and approved subprocessors
Data deletionData retention and deletion follow contractual terms, operational safeguards, and backup lifecycle requirements
AssuranceOur security program is aligned to common control frameworks and continues to mature over time

Architecture Principles

  • Defence in depth — Layered controls are applied across edge, application, network, and storage boundaries
  • Least privilege — Access is scoped using managed identities, roles, and approval-based controls
  • Private by default — Backend connectivity is designed to minimize unnecessary public exposure
  • Encryption by default — Production data is encrypted at rest and in transit across supported service paths
  • Auditable operations — Security-relevant events are logged and monitored to support investigation and review
Questions about our security practices? Contact us at security@meetdoris.com.