Skip to main content
SyneHQ is designed with a privacy‑by‑default architecture: queries execute in your environment, and we maintain a zero‑data‑footprint model for SaaS. Enterprise self‑hosting offers full control over data location, keys, and runtime.

Data handling

TopicSaaSSelf‑Hosted (Enterprise)
Query executionIn your DBs; no data persisted by SyneHQIn your environment
Result cachingEphemeral, encrypted, configurableCustomer‑controlled
Logs & metricsMetadata only; no sensitive payloadsCustomer‑controlled

Encryption

Native integration with Infisical for secrets lifecycle and encryption key management
  • TLS 1.2+ for all client ↔ server and server ↔ data‑source traffic
  • Strong cipher suites; HSTS on public endpoints
  • SaaS: encrypted volumes and key management via CSP KMS
  • Self‑hosted: use your KMS/HSM; enable disk/database encryption
  • Rotated regularly; scoped, least‑privilege keys
  • Option to integrate with customer KMS (enterprise)

Identity & access

ControlDetails
SSOSAML / OIDC (OAuth2) integrations
RBACLeast‑privilege roles at org, space, resource levels
SCIM (enterprise)Automated provisioning and de‑provisioning
Session securityShort‑lived tokens, refresh rotation, device revocation

Auditing

  • Authentication and admin actions
  • Connection and permission changes
  • Query runs and dashboard shares (metadata only)
  • Streaming to SIEM (enterprise): Splunk, Datadog, ELK
  • Configurable retention policies (enterprise)

Compliance

StandardCoverage
SOC2 Type IIControls, continuous monitoring, third‑party audits
GDPRDPA, sub‑processor transparency, user rights workflows
HIPAA (enterprise)BAAs, technical and administrative safeguards
PCI DSS (enterprise)Segmented processing and hardened controls

Network security

  • WAF, DDoS protection, rate limiting
  • Strict CORS and CSP
  • Use Local Connections via the Rabbit tunnel for on‑prem/private DBs
  • IP allow‑listing and VPC/VNet peering options (enterprise)

Secrets & configuration

  • Encrypted secrets storage; no plaintext in logs
  • Per‑connection least‑privilege DB users recommended
  • Optional customer‑managed secrets providers (enterprise)
  • First‑class support for Infisical for centralized secrets, environment configs, and automatic rotation
Infisical can be used in both SaaS and self‑hosted deployments to manage application secrets, database credentials, and encryption keys. Typical setup: sync SyneHQ environment variables and connection credentials from Infisical projects and use just‑in‑time decryption at runtime.

Secure deployments

Need a tailored security review or questionnaires (CAIQ, SIG)? Contact our enterprise team.
I