Skip to main content

Security Overview

Updated this week

Last Updated: 2026-02-06

How BlazeSQL Works

BlazeSQL is an AI-powered data analyst that connects to your SQL databases and answers questions in natural language. It writes SQL queries, runs them against your database, and returns results as tables, charts, and dashboards.

BlazeSQL never imports or copies your full database. The AI needs only your schema — table names, column names, and data types — to generate accurate SQL. When offline mode is enabled (default on Desktop), only schema metadata is sent to our servers. When offline mode is disabled, query results are also sent for deeper AI analysis. Your actual data rows are queried on demand and handled differently depending on which BlazeSQL product you use.

All data is encrypted — AES-256 at rest and TLS 1.2+ in transit across every deployment model. Zero Data Retention (ZDR) is enabled on all AI model calls.


Zero Data Retention (ZDR)

BlazeSQL runs large language models on Google Cloud Platform Vertex AI. We have enabled and verified Zero Data Retention on all Vertex AI model calls. This means:

  • Prompts and responses are not stored by Google. When BlazeSQL sends a query to the AI model, neither the input nor the output is retained by Google after the response is returned.

  • Your data is not used to train or improve Google's models. ZDR explicitly prevents this.

No Model Training on Customer Data

BlazeSQL does not train its own models on customer data. Customer data is used solely to provide the BlazeSQL service — answering your questions, generating insights, and enabling collaboration within your team. No exceptions unless a customer explicitly opts in via a separate written agreement.


Compliance

BlazeSQL runs entirely on Google Cloud Platform. GCP's infrastructure holds the following certifications:

GCP Infrastructure Certifications (held by Google Cloud Platform, not BlazeSQL)

Certification

Held By

Scope

SOC 1, SOC 2, SOC 3

Google Cloud Platform

Security, availability, and confidentiality controls

ISO 27001

Google Cloud Platform

Information security management

ISO 27017

Google Cloud Platform

Cloud-specific security controls

ISO 27018

Google Cloud Platform

Protection of personally identifiable information in public cloud

GDPR

Google Cloud Platform

EU data protection regulation

CCPA

Google Cloud Platform

California Consumer Privacy Act

HIPAA

Google Cloud Platform

Health Insurance Portability and Accountability Act

FIPS 140-2 Level 3

Google Cloud Platform

Cryptographic key management (via Cloud HSM)

BlazeSQL's own compliance posture includes:

  • GDPR compliance: Data export and deletion requests fulfilled within 14 days. Subprocessor transparency. Data subject rights supported.

  • HIPAA readiness: BlazeSQL has a Business Associate Agreement (BAA) with Google. Enterprise customers requiring HIPAA compliance can sign a BAA directly with BlazeSQL.

  • CCPA compliance: Consumer rights under CCPA are supported.


Data Retention and Deletion

  • Self-service deletion: Delete any stored data — including chats, queries, dashboards, results, database connections, credentials, and schema metadata — at any time from within the application.

  • Bulk deletion: Organization-wide bulk deletion available through BlazeSQL support.

  • Source databases unaffected: Deleting data in BlazeSQL removes it from BlazeSQL's storage only. Your source database is never modified.

  • Data export: Request a machine-readable export of your data, fulfilled within 14 days.

  • Account termination: Associated data is deleted upon account closure, subject to any legally required retention periods.


Incident Response

BlazeSQL maintains a structured incident response process:

  1. Identification: GCP security controls and real-time monitoring flag unusual activity immediately.

  2. Assessment: Security team evaluates severity, documents scope and potential impact, and prioritizes response.

  3. Containment: Affected components are isolated to limit exposure. The source of the incident is identified and eliminated.

  4. Recovery: Services and data are restored using GCP's backup and recovery infrastructure.

  5. Post-Incident Review: Root cause analysis, response effectiveness evaluation, gap identification, and prevention planning.

  6. Communication: Transparent, timely updates to all affected stakeholders throughout the process. Affected customers are notified in accordance with applicable regulations (e.g., within 72 hours per GDPR requirements).


Architecture: Three Ways to Use BlazeSQL

Desktop App

Desktop App Architecture

The desktop application connects directly from your device to your database. With offline mode enabled (on by default), query results travel from your database to your machine and are stored locally — your data rows never pass through BlazeSQL's servers.

What does sync to our servers: Database schema metadata (table names, column names, data types), database connection credentials, and chat messages. These are required for the AI to generate and execute queries and are encrypted in transit and at rest.

Exceptions: SQL Server connections using Windows Authentication rely on your device's local credentials and do not send credentials to BlazeSQL's servers. Connections using Entra Authentication are token-based and do not require stored credentials.Optional features that send data to our servers (all disabled by default):

  • Disabling offline mode — enables deeper analysis, error correction, and follow-up questions

  • AI-generated email reports

  • Advanced model for forecasting and statistical analysis

Web App

Web App Architecture

The web application runs at blazesql.com/app. Your database connection is made from BlazeSQL's cloud infrastructure on Google Cloud Platform, using a static IP address you can whitelist.

Query results, chat history, saved queries, and dashboards are stored server-side in GCP Firestore to enable collaboration, sharing, and fast access without re-querying your database. All stored data is encrypted (AES-256 at rest, TLS in transit) and deletable at any time.

Database Connection API

Database Connection API Architecture

The Database Connection API provides the same data isolation as the Desktop App (with offline mode enabled) — query results are stored locally on the end user's device and never touch BlazeSQL's servers. Use it when you need web-based access or embedded analytics with maximum data isolation.


Data Handling Summary

Data Type

Stored on BlazeSQL Servers?

Details

Schema metadata (table names, column names, data types)

Yes (encrypted, deletable)

Required for SQL generation

Unique values for categorical columns (optional)

Yes (encrypted, deletable)

Improves query accuracy

Database credentials

Yes (encrypted, deletable)

Executes queries on your behalf. Exceptions: SQL Server with Windows Authentication (uses local device credentials); Entra Authentication (token-based, no stored credentials)

Chat messages

Yes (encrypted, deletable)

AI conversation history

Query results — Desktop App

No

Stored locally on your device (default). Disabling offline mode sends results to our servers for deeper analysis. BigQuery exception: results stored on BlazeSQL servers.

Query results — Web App

Yes (encrypted, deletable)

Enables dashboards, sharing, collaboration

Query results — DB Connection API

No

Stored locally — same isolation as Desktop App


Encryption

Layer

Standard

Details

Data at rest

AES-256

All data in Google Cloud data centers

Data in transit

TLS (HTTPS)

All communications between clients and servers

Firestore

AES-256 + TLS

Automatic encryption at rest and in transit, with custom security rules

Key management (enterprise)

FIPS 140-2 Level 3

Available via Google Cloud HSM


Access Controls

  • Admin-controlled access: The person who adds a database to BlazeSQL controls who can access it. Only explicitly invited users can view the database.

  • Permission levels: Invitees receive either read-only access or read-write access (including creating, updating, and deleting tables), set by the admin.

  • Network isolation: BlazeSQL servers run in a firewalled, non-public subnet.

  • Static IP: Web app connections originate from a static IP address for customer firewall whitelisting.


Authentication

  • Single Sign-On (SSO): SAML 2.0 and OpenID Connect supported for enterprise deployments.

  • Multi-Factor Authentication (MFA): Two-factor authentication (2FA) is available natively. MFA is also enforced through your identity provider when using SSO (SAML/OpenID Connect).

  • Standard authentication: Email and password.

  • Service principal authentication: Available for programmatic access and integration with enterprise identity providers (e.g., Microsoft Entra ID). Contact [email protected] for details on specific IdP support.


Logging and Monitoring

Enterprise customers can enable comprehensive event logging:

  • User activity: Who generated, modified, or deleted queries; which data was accessed; timestamps for all actions.

  • Security events: Failed login attempts, changes to user roles, permission modifications.

  • System activity: System events including updates, errors, and restarts.

  • Server logs: Web requests, browser type, referring pages, and timestamps are retained for a minimum of 1 year. Logs are available for audit purposes or deleted upon request.

All users require unique accounts, enabling precise activity tracing and audit trails.


Internal Access

Access to production systems and customer data by BlazeSQL personnel is restricted to essential engineering staff required for service operation and support. Production access is logged and reviewed regularly. Employees with production access are bound by confidentiality obligations and use unique accounts — shared credentials are not permitted. Access is revoked promptly upon departure or role change.


Security Testing

BlazeSQL's infrastructure inherits GCP's continuous security testing program, and GCP holds SOC 2 certification covering its infrastructure security controls. BlazeSQL conducts independent application-layer penetration testing, with results available to enterprise customers under NDA. For enterprise customers evaluating BlazeSQL, we can provide additional security information and work with your assessment process.

Security issues can be reported to [email protected].


Business Continuity and Disaster Recovery

Daily backups with 30-day retention. Recovery targets: RPO 24 hours, RTO 7 days. BlazeSQL's infrastructure runs on GCP, which provides built-in redundancy and automated failover across availability zones. For enterprise deployments, custom backup and DR configurations are available.


Software Development Lifecycle

All code changes require peer review via GitHub pull requests. Dependencies are monitored for known vulnerabilities via GitHub Dependabot.


Enterprise Options

Feature

Description

Database Connection API

Web and embedded analytics with maximum data isolation — query results stored locally, same as Desktop App

SSO (SAML / OpenID Connect)

Integrate with your identity provider, with MFA enforced through your IdP

HIPAA BAA

Business Associate Agreement for healthcare compliance

Dedicated GCP region

Deploy in a specific GCP region for data residency requirements — contact [email protected]

Audit logging

Comprehensive activity and security event logging


Contact

For security questions, enterprise pricing, or to request additional documentation:

For support: [email protected]


© Blaze Analytics vGmbH (LU35935057), 23 Boulevard Friedrich Wilhelm Raiffeisen, 2411 Luxembourg

Did this answer your question?