M
Meza AI

🔒 Security

How Meza AI protects your data.

Overview

Security is a top priority at Meza AI. We implement industry-standard security practices to protect your customer data and ensure compliance with regulatory requirements.

Data Protection

🔐

Encryption at Rest

All data encrypted using AES-256 encryption

🔒

Encryption in Transit

TLS 1.2+ for all network connections

👁️

Read-Only Access

Meza AI only reads your data — never modifies it

📋

Audit Logging

Complete audit trail of all access and actions

Infrastructure Security

  • Cloud Hosting — Hosted on enterprise-grade cloud infrastructure
  • Network Security — Firewalls, intrusion detection, DDoS protection
  • 24/7 Monitoring — Continuous security monitoring and alerting
  • Regular Backups — Automated encrypted backups with point-in-time recovery
  • Vulnerability Scanning — Regular automated security scans
  • Penetration Testing — Annual third-party penetration tests

Compliance

SOC 2

Type II Certified

GDPR

Compliant

CCPA

Compliant

HIPAA

Ready

Access Controls

  • Role-Based Access — Granular permissions with Admin, Manager, Viewer roles
  • SSO Integration — Support for SAML-based single sign-on (Enterprise)
  • MFA — Multi-factor authentication support
  • Session Management — Automatic session timeout and revocation

Best Practices

We recommend these security best practices when using Meza AI:

  • Use read-only credentials — Create dedicated read-only database users for Meza AI
  • Enable SSH tunnels — Use SSH tunnels for databases behind firewalls
  • Review access regularly — Audit user access and remove inactive users
  • Use role-based permissions — Assign minimum necessary permissions
  • Enable SSO — Use SSO for centralized authentication (Enterprise)
  • Whitelist IPs — Restrict database access to Meza AI IPs only

Meza AI IP Addresses

Whitelist these IP addresses for database connections:

34.102.136.180
35.247.10.205

Data Retention

  • Activity Data — Retained for 90 days by default (configurable)
  • Health Score History — Retained for 1 year
  • Signal History — Retained for 1 year
  • Audit Logs — Retained for 2 years

💡 Note

For security questions, vulnerability reports, or compliance documentation requests, contact security@meza.ai

What's Next?