Skip to main content

Security Features

Estuary provides a number of security features to protect your data. This document covers some of the broadest capabilities built into the Estuary platform.

You can also find guides on setting up specific features, such as:

Data encryption in motion and at rest

Data is encrypted at every step of the way. Connector secrets are automatically encrypted, whether you set them up in the UI or via the flowctl CLI.

Immutable infrastructure

Systems are rebuilt with every new update to ensure they remain secure and up-to-date.

Zero-trust network model

All communications are secured using TLS and mutual TLS (mTLS) for internal communications.

Role-based access control (RBAC)

Role-based access control ensures secure resource sharing, with centralized verification of authorizations.