Skip to content

Data Flow Guide

This guide documents how data flows within Invisiq and what external network connections the product makes. It is intended to support network egress validation and data residency verification.

Invisiq is designed with a data-residency-first approach:

  • All customer data is stored in your own infrastructure.
  • Enprivacy has no access to your data.
  • Outbound internet connectivity is minimised to a single endpoint for user management.
SourceDestinationDataProtocol
ApplicationDatabaseApplication dataTLS (internal)
ApplicationObject storageFile uploadsTLS (internal)

The product makes the following outbound connections to external services:

DestinationPortProtocolPurposeData transmitted
auth.enprivacy.com443HTTPSUser authentication and entitlementUser identity (email, user ID, roles)

No customer data is transmitted to Enprivacy or any other external party.

The product does not phone home to check for updates or send telemetry. All features (except user authentication) work fully air-gapped.

See Data Security & Privacy for details on where data is stored and encryption recommendations.

You can validate the product’s network egress by:

  1. Deploying with a network egress proxy or firewall logging enabled.
  2. Allowing only auth.enprivacy.com:443 in your egress allow-list.
  3. Blocking all other outbound traffic and verifying that no application features break (except authentication).