Skip to Content
Security

Security

Spiral is designed with security as a core principle, implementing defense-in-depth strategies across authentication, authorization, encryption, and data protection.

Architecture

Spiral Tables are designed in such way that your data never leaves your VPC. The only exception are key columns. Spiral stores key schema for each table, which includes key column names, and tracks fragments which include key column stats, such as min/max values. PySpiral, Spiral client library, runs in your VPC and can access your bucket, but it is not authorized to read from the bucket. Spiral, control plane, provides temporary authorization for each read / write operation to PySpiral via signed URLs.

VPC

Authentication

Spiral supports multiple authentication mechanisms to integrate with your existing infrastructure.

OIDC Integrations

Spiral integrates with several OIDC (OpenID Connect) identity providers for seamless workload authentication:

  • GCP - Google Cloud service accounts
  • Modal - Serverless platform integration
  • AWS - AWS IAM roles (coming soon)

See OIDC Integrations for detailed setup instructions.

SSO (Single Sign-On)

Enterprise organizations can configure SSO through WorkOS, enabling:

  • SAML and OIDC-based enterprise SSO
  • Domain-verified automatic user provisioning
  • Centralized identity management

Authorization

Spiral implements role-based access control (RBAC) with fine-grained permissions. See Authorization for complete details.

Hierarchy

Access is controlled at two levels:

  1. Organization level - Manages membership and project creation
  2. Project level - Controls access to tables, indexes, and file systems

Roles

RoleProject Access
AdminFull access including grant management
EditorRead/write access to all resources
ViewerRead-only access

Principals

Grants can be assigned to various principal types:

  • Users and user groups
  • Organizations and teams
  • Workloads (service accounts, GitHub Actions, Modal apps)

Use OIDC-based workload authentication instead of static API keys whenever possible. This eliminates the need to manage and rotate secrets.

Encryption

Encryption in Transit

All communication with Spiral is encrypted using TLS 1.2 or higher:

  • HTTPS only - All API endpoints require TLS
  • Modern cipher suites - Using industry-standard encryption
  • Certificate validation - Web PKI root certificate verification

Encryption at Rest

Data stored in Spiral is protected at rest:

  • Object storage encryption - Data files are encrypted by the underlying cloud storage (S3, GCS, Azure Blob)
  • Database encryption - Metadata is encrypted at rest in the database layer

Data Protection

Multi-Tenant Isolation

Spiral provides strong isolation between tenants:

  • Organization boundaries - Data is isolated at the organization level
  • Project scoping - All operations are scoped to authorized projects

Network Security

API Security

  • Rate limiting - Protection against abuse
  • Request validation - All inputs are validated before processing
  • CORS configuration - Controlled cross-origin access

Compliance

Spiral is designed to help you meet compliance requirements:

  • Data residency - Control where your data is stored
  • Access controls - Fine-grained RBAC for compliance with least-privilege principles
  • Audit trails - Logging for compliance and forensics

Contact us for specific compliance requirements including SOC 2, HIPAA, or GDPR.

Security Best Practices

For Administrators

  1. Use SSO - Enable SSO for your organization when possible
  2. Principle of least privilege - Grant only the minimum necessary permissions
  3. Regular access reviews - Periodically review and revoke unnecessary grants
  4. Use workload identity - Prefer OIDC over static credentials

For Developers

  1. Use OIDC authentication - Avoid storing API keys in code or configuration
  2. Scope access appropriately - Request only the permissions your workload needs
  3. Rotate credentials - If using API keys, rotate them regularly
  4. Secure your environment - Protect the environment where Spiral credentials are used

Reporting Security Issues

If you discover a security vulnerability in Spiral, please report it responsibly:

We take all security reports seriously and will respond promptly.

Last updated on