Secure by design.

Independently audited from end to end.

Codegiant operates under SOC 2 Type II controls covering security, availability, and confidentiality. Reports and ongoing evidence are available through our Trust Center so your security and procurement teams can complete reviews without delay.

  • Security
  • Availability
  • Confidentiality
  • Change management
  • Access controls
  • Incident response

Privacy by default for EU and global customers.

Data processing commitments, a published DPA, and privacy controls aligned with GDPR - so your customer obligations carry through to Codegiant.

Published DPA

Customer-ready data processing addendum reflecting GDPR obligations.

Regional data residency

Choose where your data lives - US or EU regions with documented controls for each.

Lawful transfers

Standard contractual clauses and documented international transfer safeguards.

Retention & deletion

Configurable lifecycle and deletion to honor customer requests and policies.

Subprocessor list

Current subprocessor list maintained in the Trust Center with change notices.

Your code and data never train someone else's models.

Codegiant guarantees that customer code, prompts, and outputs stay inside your tenant. Your inputs and outputs are not used to train any underlying foundation model - yours or anyone else's.

No training on your code

Customer source code is excluded from training underlying foundation models.

No training on your prompts

Prompts, completions, and intermediate outputs stay inside your tenant boundary.

Provider isolation

Inference runs against models with zero-retention agreements from underlying providers.

Customer-owned outputs

You retain ownership and rights to all code and artifacts the AI produces.

Security at every layer of your stack.

From identity and access through infrastructure, observability, and incident response - Codegiant gives teams the governance they need to modernize safely.

Identity & access

SAML SSO, role-based access, and organization controls govern who can reach sensitive systems.

Data protection

Encryption in transit and at rest, scoped access, and least-privilege defaults across the platform.

Application security

Secure SDLC, dependency scanning, code review, and hardened production defaults.

Operational resilience

Monitoring, audit trails, incident response, and ongoing vendor reviews.

Answers your security team is already looking for.

The questions that show up most often in procurement, legal, and security reviews - answered up front.

Where is data hosted?

In your cloud. Applications built on Codegiant deploy directly into your own account across 10+ supported providers - AWS, GCP, Azure, Cloudflare, DigitalOcean, and more - so your data and traffic stay inside your perimeter, in the region you choose.

Who can access my data?

Access is scoped to your organization with SAML SSO, role-based controls, and full audit trails for sensitive actions.

Is my data used to train AI models?

No. Customer code, prompts, and outputs are excluded from training any underlying foundation models.

How is data encrypted?

TLS 1.2+ in transit and AES-256 at rest, with managed keys across all storage tiers.

Can I run Codegiant in my own environment?

Yes - it's the default. One-click deploys push every application into your own cloud account or on-prem environment, so production data and traffic never leave your infrastructure.

How do retention and deletion work?

Configurable lifecycle policies per workspace, plus on-request deletion supported by the published DPA.

Start building today.

Harness the power of enterprise-grade AI and 700+ connectors to build what’s next.