🔒

Security

Authentication

EchelonGraph supports multiple authentication methods, configurable per-tenant to match your organization's security requirements.

Email / Password

  • Industry-standard password hashing with constant-time comparison
  • Automatic account lockout after repeated failed attempts
  • Secure token handling with HttpOnly, Secure, and SameSite cookie attributes

Single Sign-On (SSO)

ProtocolSupported Providers
SAML 2.0Okta, Azure AD, OneLogin, PingIdentity
OIDCGoogle Workspace, Okta, Azure AD, Auth0, Keycloak
LDAP / Active DirectoryAny LDAP-compliant directory (LDAPS and StartTLS supported)

SSO integrations support automatic user provisioning and group-to-role mapping. See Integrations for setup guides.

WebAuthn / Passkeys

Support for hardware security keys (YubiKey) and biometric authentication (Face ID, fingerprint) via the WebAuthn standard.


Multi-Factor Authentication

  • TOTP: Compatible with Google Authenticator, Authy, 1Password, and other RFC 6238 apps
  • WebAuthn: Hardware security keys and biometric authentication
  • Recovery codes: Single-use backup codes for account recovery
  • Tenant MFA policies: Administrators can enforce MFA as off, optional, or required for all users in their organization

Role-Based Access Control (RBAC)

Four customer-facing roles provide granular access control:

RoleWhat They Can Do
ViewerRead-only access to dashboards, assets, alerts, and reports
AnalystViewer + manage alerts, create reports, export data
OperatorAnalyst + manage scans, cloud accounts, and integrations
AdminFull tenant administration — users, settings, SSO, billing

Each role inherits all permissions from the roles below it, providing a clear security hierarchy.


SCIM 2.0 Provisioning

Automate user lifecycle management directly from your identity provider. Provision users, sync group memberships, and map groups to EchelonGraph roles — all through the SCIM 2.0 standard. Compatible with Okta, Azure AD, OneLogin, and any SCIM-compliant IdP.


Encryption

LayerProtection
In transitTLS 1.2+ on all connections and API endpoints
At restAES-256 encryption on all managed data stores
Sensitive fieldsField-level encryption for credentials and personally identifiable information
Self-hostedBring Your Own Key (BYOK) — customer-managed encryption keys

Audit Trail

Every security-relevant action is recorded in an immutable, tamper-proof audit log:

  • Authentication events (login, logout, MFA verification, SSO, failed attempts)
  • Permission changes (role assignments, user invites, deactivations)
  • Configuration changes (cloud accounts, SSO settings, MFA policies)
  • Data exports (report generation, compliance exports)

Audit logs are retained for 90 days by default, configurable up to 365 days on Enterprise plans. Logs can be exported for external SIEM integration.


Incident Response

EchelonGraph maintains a structured incident response process for platform security events. We classify incidents by severity and commit to defined response times. For security concerns or to report a vulnerability:

Responsible disclosure: security@echelongraph.io


Infrastructure Security

  • Network isolation: Data stores are never exposed to the public internet
  • Minimal attack surface: Lightweight container images running as non-root processes
  • Rate limiting: Per-tenant rate limits on all API endpoints with brute-force protection
  • Built-in WAF: Web application firewall with IP blocking and configurable rules
  • Continuous scanning: Automated security scanning on every deployment
  • Dependency monitoring: Continuous vulnerability monitoring across all dependencies