clayva
PRODUCTS
Analytics Agent
Experiment Agent
Research Agent
Growth Agent
PLATFORM
Infrastructure
ADKs
Integrations
MCP Server
ROLES
Engineering
Data Science
Product Team
ORGANIZATIONS
Enterprise
Startups
Self-Hosted
BY INDUSTRY
SaaS
E-commerce
FinTech
Media & Entertainment
Healthcare
The Clayva Tribune
Est. 2024 • San Francisco

Agent Runtime Revolution Transforms Product Development

By Editorial Board • 2 min read
AI Agents Ship 10x More Features Tech Startup Cuts Dev Time by 90% Case Study The Future of Autonomous Code Opinion
Read All Articles →
GET STARTED
Documentation
API Reference
MCP Playbooks
Agent Templates
LEARN
Demos
Newsletter
Webinars
Pricing
Log in Get started for free
Get started
clayva
PRODUCTS
Analytics Agent Experiment Agent Research Agent Growth Agent
PLATFORM
Infrastructure ADKs Integrations MCP Server
ROLES
Engineering Data Science Product Team
ORGANIZATIONS
Enterprise Startups Self-Hosted
BY INDUSTRY
SaaS E-commerce FinTech Media & Entertainment Healthcare
Documentation API Reference MCP Playbooks Agent Templates Blog Newsletter Demos
Pricing
Log in
Get started

Reach out to us, we are here to help

Please fill out the form and we will get back to you as soon as possible

Wait! Have a technical question?

Reach out on Slack

"At Clayva, we want to iterate as fast as possible. Clayva enables us to grow, scale, and learn efficiently."

Company logo
Customer 1 Customer 2 Customer 3 Customer 4 Customer 5 Customer 6
  1. Home /
  2. Legal /
  3. Security

Security

Last updated: 2024-11-01 Version 2.0 Download PDF
SOC 2 Type II ISO 27001 PCI DSS HIPAA GDPR

At Clayva, security is fundamental to everything we do. We employ industry-leading security practices and maintain rigorous compliance standards to ensure your data remains protected, private, and available when you need it.

Security Overview

Clayva implements a comprehensive, defense-in-depth security strategy that protects your data at every layer. Our security program is built on three core principles:

Certifications & Compliance

Clayva maintains certifications from independent third-party auditors to validate our security controls and compliance with international standards:

SOC 2

SOC 2 Type II

Annual audit of security, availability, and confidentiality controls

View Report →
ISO

ISO 27001:2013

Information security management system certification

View Certificate →
PCI

PCI DSS Level 1

Payment card data security compliance

View Attestation →
HIPAA

HIPAA Compliant

Healthcare data privacy and security

Learn More →

Infrastructure Security

Data Centers

Clayva's infrastructure is hosted on Amazon Web Services (AWS) and Google Cloud Platform (GCP), leveraging their world-class physical security:

  • 24/7 physical security with biometric access controls
  • Environmental monitoring and fire suppression systems
  • Redundant power and cooling systems
  • Geographic distribution across multiple availability zones
  • Regular third-party security audits and certifications

Network Security

Our network architecture implements multiple layers of protection:

  • Firewalls: Web application and network firewalls filter malicious traffic
  • DDoS Protection: CloudFlare and AWS Shield protect against distributed attacks
  • Network Segmentation: Isolated networks for different service tiers
  • Private Networking: Internal services communicate via private VPC
  • Traffic Monitoring: Real-time analysis and alerting for anomalies

Encryption

Feature

Application Security

Secure Development

We follow secure software development lifecycle (SSDLC) practices:

  • Code Reviews: All code undergoes peer review before deployment
  • Static Analysis: Automated scanning for security vulnerabilities
  • Dependency Scanning: Regular updates and vulnerability patching
  • Security Testing: Regular penetration testing and vulnerability assessments
  • Bug Bounty Program: Rewarding security researchers for responsible disclosure

Authentication

Authentication Methods:
  • Multi-factor authentication (MFA) with TOTP/SMS/WebAuthn
  • Single Sign-On (SSO) via SAML 2.0 and OAuth 2.0
  • Passwordless authentication options
  • Session management with automatic timeout
  • Account lockout after failed attempts

Access Control

Granular access controls ensure users only access what they need:

  • Role-Based Access Control (RBAC): Predefined roles with specific permissions
  • Team Management: Organize users into teams with shared permissions
  • API Key Scoping: Limited permissions for programmatic access
  • IP Restrictions: Allowlist specific IP addresses or ranges
  • Audit Logging: Complete trail of all access and changes

Data Security

Data Protection

Multiple layers of protection for your data:

  • Data Classification: Automatic classification and appropriate handling
  • Data Loss Prevention: Monitoring and prevention of unauthorized data export
  • Backup Strategy: Regular encrypted backups with point-in-time recovery
  • Data Isolation: Logical separation between customer data

Data Privacy

Privacy by design principles:

  • Minimal data collection - only what's necessary
  • Purpose limitation - data used only for stated purposes
  • Data minimization and anonymization where possible
  • User consent and control over personal data
  • Regular privacy impact assessments

Data Retention

Data is retained according to your subscription plan and legal requirements. You can configure retention policies and request data deletion at any time through your account settings or by contacting support.

Operational Security

Our operational security practices ensure ongoing protection:

Employee Security

  • Background checks
  • Security training
  • NDAs and confidentiality
  • Principle of least privilege

Monitoring & Logging

  • 24/7 security monitoring
  • Centralized log management
  • Real-time alerting
  • Security metrics dashboard

Change Management

  • Documented procedures
  • Approval workflows
  • Automated deployments
  • Rollback capabilities

Vulnerability Management

  • Regular scanning
  • Patch management
  • Risk assessments
  • Remediation tracking

Incident Response

Our incident response plan ensures rapid detection and response to security events:

1

Detection

Automated monitoring and alerting systems

2

Assessment

Security team evaluates severity and impact

3

Containment

Immediate action to prevent spread

4

Remediation

Fix vulnerabilities and restore services

5

Communication

Notify affected parties as required

6

Review

Post-incident analysis and improvements

Business Continuity

Our business continuity plan ensures Clayva remains available during disruptions:

  • High Availability: Multi-region deployment with automatic failover
  • Disaster Recovery: RPO of 1 hour, RTO of 4 hours
  • Data Backups: Automated daily backups with 30-day retention
  • Regular Testing: Quarterly DR drills and failover tests
  • Communication Plan: Status page and customer notification procedures

Vendor Management

We carefully evaluate and monitor all third-party vendors:

  • Security assessment before engagement
  • Contractual security requirements
  • Regular security reviews
  • Data processing agreements
  • Minimal vendor access to systems

Contact Security Team

Report a Security Issue

If you discover a security vulnerability, please report it to our security team immediately:

Email: security@clayva.com
PGP Key: Download our PGP key

We appreciate responsible disclosure and offer a bug bounty program for qualifying vulnerabilities.

Bug Bounty Program →

Security Resources

📄 Security Whitepaper 📋 SOC 2 Report 🔍 Pen Test Results 📝 Security Questionnaire

Table of Contents

  • Security Overview
  • Certifications & Compliance
  • Infrastructure Security
    • Data Centers
    • Network Security
    • Encryption
  • Application Security
    • Secure Development
    • Authentication
    • Access Control
  • Data Security
    • Data Protection
    • Data Privacy
    • Data Retention
  • Operational Security
  • Incident Response
  • Business Continuity
  • Vendor Management
  • Contact Security Team

Questions about this document?

If you have any questions about this security, please contact us at legal@clayva.com

Contact Sales Get Support

Stay Updated

Get weekly insights for product teams

Products

  • Analytics Agent
  • Experiment Agent
  • Research Agent
  • Growth Agent

Platform

  • Infrastructure
  • ADKs
  • Integrations
  • MCP Server

Solutions

  • Product Team
  • Data Science
  • Enterprise
  • Startups
  • Self-Hosted

Industries

  • SaaS
  • E-commerce
  • FinTech
  • Media & Entertainment
  • Healthcare

Resources

  • Documentation
  • API Reference
  • MCP Playbooks
  • Agent Templates
  • Blog
  • Newsletter
  • Demos

Company

  • About
  • Careers
  • Pricing
  • Contact Sales
  • System Status

Legal

  • Privacy Policy
  • Terms of Service
  • Security
  • Cookie Policy
  • Compliance
© 2025 Clayva. All rights reserved.

Reach out to us, we are here to help

Please fill out the form and we will get back to you as soon as possible

Wait! Have a technical question?

Reach out on Slack

"At Clayva, we want to iterate as fast as possible. Clayva enables us to grow, scale, and learn efficiently."

Company logo
Customer 1 Customer 2 Customer 3 Customer 4 Customer 5 Customer 6