Authentication
HatiData supports three authentication methods, each suited to different access patterns. All authentication is enforced at the control plane middleware layer before any request reaches business logic.
HatiData supports three authentication methods, each suited to different access patterns. All authentication is enforced at the control plane middleware layer before any request reaches business logic.
HatiData combines Role-Based Access Control (RBAC) with Attribute-Based Access Control (ABAC) to provide fine-grained authorization. RBAC defines what a user can do; ABAC defines when and how they can do it.
This page consolidates the most common security questions from CISOs, security teams, and procurement reviewers. All answers reflect HatiData's in-VPC deployment architecture where customer data never leaves the customer's network.
HatiData protects sensitive data through four complementary mechanisms: column masking, row-level security, PII redaction in audit logs, and tenant isolation. These protections operate at different stages of the query pipeline and can be combined for defense-in-depth.
HatiData is built with a security-first architecture. All data processing occurs within the customer's VPC, ensuring complete data sovereignty and zero egress. This page provides a comprehensive overview of every security layer in HatiData.
Executive Summary