Live
Energy Manager
Operate portfolios with live data
Enterprise-grade controls designed for multi-tenant energy portfolios. Encryption, access control, auditability, and governance aligned with modern enterprise security expectations.
(TLS 1.3 where supported)
(Google Cloud default encryption)
SOC 1 / SOC 2 / SOC 3 (via Google Cloud / Firebase services)
Human-in-the-loop · No customer data used for model training · Purpose-limited processing
The estidami platform, applications and Services are built on Google Cloud infrastructure with enterprise-grade encryption, access controls, and auditability. All data is encrypted in transit (TLS 1.2+) and at rest (AES-256).
We implement role-based access control (RBAC), maintain comprehensive audit logs, and follow zero-trust principles. Our security controls are designed to align with ISO 27001 and SOC standards.
Read our Privacy Policy for information about data collection and processing.
Security is fundamental to how we build and operate estidami software, applciations and Services. This page outlines the security controls, technical safeguards, and compliance posture that protect your data and operations.
Our security approach is designed for multi-tenant energy portfolios where confidentiality, integrity, and availability are critical business requirements.
The foundational layers that protect data within the estidami platform:
All data transmitted between your browser and our services uses TLS 1.2 or higher (TLS 1.3 where supported). Data stored in our databases and file storage is encrypted at rest using AES-256 encryption by default.
Access to facilities, projects, and data is governed by granular role-based permissions. Users only see and access data within their assigned scope. Administrative privileges are separated from operational roles.
Critical operations are logged and retained for audit purposes. Logs capture user actions, data access events, and system changes with timestamps and user identity. Logs are retained in accordance with security and compliance requirements.
Authentication is required for all platform access. Session tokens have defined expiration policies. Security rules enforce data isolation between tenants and projects at the database level.
We minimize data collection to what is necessary for service delivery. Personal data processing follows GDPR principles. Customer data is logically isolated by facility and project boundaries. Data retention and deletion policies are honored upon request or contract termination.
The underlying platforms and controls supporting security and resilience:
The estidami platform, application, and services are deployed on Google Cloud Platform (Firebase and Cloud Functions). Customer deployments can be provisioned in multiple regions including US, EU, or Middle East depending on contractual requirements.
For customers requiring additional control over encryption keys, CMEK can be enabled to allow key management through Google Cloud KMS or a supported external key manager.
Sensitive operations such as data extraction, normalization, and reporting are executed server-side in Cloud Functions. Client browsers never have direct access to raw uploaded files or privileged database operations.
Firebase App Check is enabled to verify that requests to backend services originate from authentic app instances and not abusive traffic or automated bots.
Firestore databases are backed up daily, with weekly snapshots retained for 14 weeks. Point-in-time recovery (PITR) is available for the past 7 days.
Note: Backup and recovery controls are resilience mechanisms and do not replace or override customer data-retention or deletion policies.
The estidami platform, applications, and Services include AI-assisted features designed to support analysis, not replace human judgment. AI capabilities are governed by strict security, privacy, and control principles.
AI is used for specific, bounded tasks such as document parsing, data normalization, anomaly detection, and draft insights. AI does not autonomously execute actions, modify customer systems, or make binding operational or financial decisions.
All AI-generated outputs are reviewable, overrideable, and contextualized. Final decisions remain with the user or an assigned expert.
Customer data processed by AI features is:
Where third-party AI services are used, data handling is governed by contractual restrictions consistent with enterprise privacy and confidentiality expectations.
AI processing runs within the same secured cloud environment as the core platform. Access is controlled through service accounts and role-based permissions, and processing is logged for traceability.
The applications do not perform fully automated decision-making with legal or material business impact as defined under GDPR Article 22. AI outputs are advisory in nature.
Security controls are applied at every stage of the data lifecycle:
Customer deployments are provisioned in US, EU or Middle East regions depending on contractual and data-residency requirements. Data does not leave the configured region.
The estidami platform, applications, and Services operate on Google Cloud infrastructure that has completed ISO 27001 and SOC 1/2/3 evaluations. These certifications apply to the underlying cloud services. estidami's organizational security controls are designed to align with these standards and customer contractual requirements.
Answers to common questions about our security implementation:
Data is hosted on Google Cloud Platform (Firebase / Firestore). Customer deployments are provisioned in US, EU or Middle East regions depending on contractual and data-residency requirements. Data does not leave the configured region.
Firestore databases are backed up daily, with weekly snapshots retained for 14 weeks. Point-in-time recovery is available for the past 7 days. These backups are for resilience and disaster recovery—they do not extend or override customer data-retention or deletion policies.
Yes, we use Firebase Authentication, which supports Google Identity Platform for SAML and OIDC integrations. SSO setup is available for Enterprise customers and can be configured to work with your corporate identity provider.
We process limited personal data (names, email addresses, roles) required for account management, access control, and service delivery. Energy consumption and facility data typically do not constitute personal data unless explicitly tied to named individuals. We process all data in accordance with applicable privacy laws, including GDPR where relevant. See our Privacy Policy for full details.
We perform code reviews, maintain monitoring and alerting, and align with the Firebase Security Checklist. Third-party penetration testing is available for Enterprise customers under mutual NDA and coordinated timing. Contact us if you require additional security assurance activities.
Last updated: January 4, 2026
For security concerns or to report vulnerabilities, please contact us at hello@estidami.com.