Your raw data never leaves your warehouse. Nothing you give us is used to train any model. Here's the architecture, the controls, and the commitments behind those statements — and an honest account of where we are as a young company.
Matriq queries your database directly via a read-only connector. We never copy, replicate, or store your raw business data on our servers — your tables stay in your warehouse, your results stay in your browser session.
Read-only database connectors, scoped credentials, row-level filters, and full audit logs of every query the agent runs — so you always know what was asked and what was returned.
Your queries, schemas, and results are never used to train foundation models. We use zero-retention LLM endpoints for inference and isolate every customer's memory layer.
A read-only path from your warehouse to your team — with the agent's reasoning living in a separate, isolated memory layer.
We're being upfront about where we are today. Every Matriq workload currently runs on Matriq Cloud. Custom deployment for regulated industries is being scoped right now with our first design partners.
Matriq Cloud
Fully managed by Matriq on AWS. Connect your database in minutes — we host, patch, and scale the stack so your team doesn't have to. This is how every Matriq customer runs today.
Custom deployment
For healthcare, finance, public sector, and other regulated teams who need Matriq to run inside their own AWS, GCP, or Azure account. We're actively scoping this with our first design partners today. If you'd be one of them, we want to talk.
All connections use TLS 1.3. Database connections use SSL/TLS with certificate pinning where supported.
AES-256 for all stored data including connection credentials, schema metadata, and learned definitions.
Database credentials are encrypted with envelope encryption using AWS KMS. Decryption is scoped to your workspace's runtime only.
Production workloads run in private subnets. No direct internet access for data planes. IP allowlisting available for warehouse connections.
Bring your own KMS keys for at-rest encryption of the memory layer. Available now for design-partner engagements running Matriq inside their own cloud account; Matriq Cloud BYOK on roadmap.
Managed PostgreSQL on AWS RDS with automated daily backups and multi-AZ failover for the control plane. Formal RPO/RTO targets will be published with our first customer DPA.
Out-of-the-box SSO for Google Workspace and Microsoft 365 accounts.
Okta, Azure AD, OneLogin, and any SAML 2.0 identity provider. SCIM 2.0 for automated provisioning and de-provisioning.
Workspace roles (Owner, Admin, Editor, Viewer) and per-data-source permissions. Limit who can connect databases, edit definitions, or publish reports.
Matriq strongly recommends — and defaults to — read-only credentials for every connected warehouse. We will refuse to execute write statements.
Every prompt, every generated query, every result returned — logged with user, timestamp, and data source. Exportable to your SIEM.
If your warehouse enforces row-level security on the connected role, Matriq inherits it automatically. The agent can only see what the credentials can see.
We'd rather be straight with you than paste a list of badges we haven't earned.
Matriq does not yet hold formal security certifications. Our architecture and controls are designed to align with the SOC 2 Trust Services Criteria from day one — read-only data paths, encryption in transit and at rest, audit logging on every query, isolated customer workspaces, zero-retention LLM endpoints, and a single point of accountability (the founder) for any incident.
We'll begin formal SOC 2 Type I work as we onboard our first paying customers. We'd rather earn the audit on real customer workloads than buy a certificate before we have any. Our approach to GDPR and CCPA is the same: we build to the principles today (data minimization, purpose limitation, deletion on request) and we'll publish a formal DPA at first customer onboarding.
Need to evaluate us right now? Email security@matriq.ai and we'll turn around a security questionnaire (CAIQ-Lite, SIG, or your own format) quickly. We're also happy to walk your security team through the architecture on a call.
A small, deliberate set of infrastructure providers powers Matriq. When we onboard our first customers, we'll publish a formal sub-processor list and DPA covering this set.
| Sub-processor | Purpose | Data accessed | Region |
|---|---|---|---|
| Amazon Web Services | Cloud infrastructure & hosting | All workspace data (encrypted) | US-East (us-east-1) |
| Anthropic | LLM inference (zero-retention API) | Schema metadata & natural language prompts only | United States |
| OpenAI | LLM inference (zero-retention API, optional) | Schema metadata & natural language prompts only | United States |
| Stripe | Billing & payment processing | Billing contact information only | United States |
| Postmark | Transactional email | Email addresses & notification content | United States |
| Cloudflare | CDN, DDoS protection, WAF | HTTP request metadata | Global edge |
Questions about any vendor on this list? Email security@matriq.ai.
If you've found a security issue, please tell us. We won't take legal action against good-faith research.
Your raw data never leaves your warehouse. Matriq queries it directly via a read-only connector and returns answers to your team. We don't replicate your tables, and Matriq staff never look at your data.
Nothing you give us is ever used to train any model — ours or our LLM providers'. We use zero-retention API endpoints from Anthropic and OpenAI. Your queries, schemas, and learned business context stay isolated to your workspace.
If you want to read the source of the agent that touches your warehouse, we'll show it to you under NDA. And if you need a custom deployment inside your own cloud account, we're scoping that with our first design partners right now — we'd love to talk.
If you ever find a gap between what this page says and what we do, tell me directly. My email is below.
We're happy to walk your security team through the architecture, fill out questionnaires (CAIQ, SIG, custom), or scope a custom-deployment engagement. Our first independent penetration test is scheduled before general availability — we'll share scope and findings under NDA when complete.
Email security@matriq.ai →