Your data is safe with Athena Studio
Experience unparalleled safety and security with our cutting-edge AI solutions designed with your data & privacy in mind.
- SOC 2 Compliant
- GDPR Compliant
- SSO Enabled
Secure by design
Security is part of who we are. Its been considered in every decision we make, and has been a part of our product from the very start.

Privacy at its core
We partner with Transcend to provide industry-best privacy controls, giving you complete authority over your data.


Certified safe and secure



Enterprise-grade security features
Secure Access
Securely access Athena Studio to streamline your writing process and create engaging content. Bring your own identity with SSO, login with Google, or use Athena Studio's password-less authentication.
Built in privacy
Athena Studio makes security and privacy simple. With an advanced suite of built-in safety measures, you can rest assured that your data is secure and confidential without any additional set up or configuration. Enjoy peace of mind knowing your information is always safe with Athena Studio.
Athena Studio
Securely power your applications with Athena Studio's powerful API. Our secure API allows you to quickly integrate Athena Studio into your existing applications, ensuring data is always protected. Streamline the content creation process & access Athena Studio from any device or platform for maximum efficiency.
Safe & Secure
Enterprise-Grade
Safe & Secure
Enterprise-Grade
Safe & Secure
Enterprise-Grade
Safe & Secure
Enterprise-Grade
Security at Athena Studio
Introduction
Protecting Customer Data
Independent Attestation
Athena Studio’s Responsibility
Your Responsibility
Conclusion
Introduction
Athena Studio is the future of content creation for enterprise marketing teams. We are committed to providing a highly available and secure environment for you to create content.
This content highlights our security practices to help you understand how we ensure security by design.
Protecting Customer Data
Athena Studio’s Security team, led by our Director of Security, is responsible for implementing and managing our security program. The focus of Athena Studio’s security program is to prevent unauthorized access, use, and disclosure of customer data. Our security program is aligned with AICPA Trust Services Principles and is constantly evolving in accordance with industry best practices.
Independent Attestation
Customers may receive copies of Athena Studio’s SOC2 report, as well as all other available documentation from our Compliance Portal at security.athenastudio.ai
Security Compliance
Athena Studio is continuously monitoring and improving upon the design and effectiveness of our security controls. We partner with a reputable third party for their independent assessment of our efforts. All internal and external audit findings are shared with executive management.
Penetration Testing
Athena Studio engages an independent third party to conduct annual network and application penetration tests. Identified findings are tracked to resolution, and results reports are shared with executive management.
Athena Studio’s Responsibility
Access Control
When provisioning access, IT adheres to the principles of least privilege and role-based access control, meaning that employees are only authorized the access and permissions required to fulfill their job responsibilities. User access reviews, including production access, are performed semi-annually. Access to the production infrastructure and supporting systems requires MFA.
Employee access is revoked within two business days of an employee’s termination. In the event of involuntary termination, access is revoked immediately.
Cloud Hosting
Athena Studio corporate offices do not host any component of the infrastructure or store customer data. Athena Studio uses GCP as its cloud hosting provider. The Athena Studio application is hosted across multiple availability zones in the US-East1 & US-West1 regions for increased redundancy.Athena Studio utilizes serverless instances across GCP to ensure high availability of all services. Kubernetes node components are hardened and have a base configuration image applied.
Data Retention
Athena Studio retains customer data for the duration of the agreement. Following termination, data is retained in accordance with Athena Studio’s Data Retention Policy, unless Athena Studio receives a written data deletion request.
Athena Studio’s hosting provider, GCP, is responsible for ensuring the proper sanitization of disks and physical media. Athena Studio sanitizes employee laptops prior to reuse or disposal.
Encryption
Athena Studio encrypts all customer data at rest and in transit using strong encryption methods. All information is transmitted via HTTPS using TLS1.2+ with AES256 encryption and SHA2 signatures, defaulting to TLS1.3 based on client ability. Data at rest is encrypted at the storage level using AES256. Database connections are verified using TLS certificates, and encrypted in transit using SSL.
Encryption keys are managed by and stored securely in GCP. Athena Studio personnel do not have access to the encryption keys. All key usage is logged and monitored for anomalous activity.
Endpoints
Employees are provisioned company-managed workstations. Employees are not permitted to use their personal devices for work (e.g., BYOD). All workstations are configured with disk encryption, anti-malware, password protection, idle lockout, and automatic OS updates. IT monitors employee workstation for deviations to ensure they are compliant with corporate policy.
Logging
Centralized logging is enabled for all production systems. These logs are reviewed for indications of compromise and alerted upon. The Security team is responsible for monitoring and alerting thresholds are reached, tracking security events to resolution in accordance with the incident response plan.
Network
Athena Studio’s firewalls are configured to deny all incoming traffic by default. Firewall rules are reviewed at least annually. Alerts generated by the Intrusion Detection System (IDS) are sent to on-call personnel for investigation and triage. Athena Studio also utilizes a WAF and CDN in order to both protect against common web application vulnerabilities, like DDoS attacks, and to provide faster access to the application.
Personnel
Security of the Athena Studio environment is the shared responsibility of all Athena Studio employees and contractors who have access to Athena Studio’s information systems. Prior to their start date, all employees and contractors must have a completed background check on file, as legally permissible. Employees and contractors must also sign a confidentiality agreement, the employee handbook, and Athena Studio’s security policies.
All employees are required to complete security awareness training upon hire and annually thereafter. Training curriculum includes phishing awareness, remote work best practices, device security, and incident reporting. Developers are required to complete additional training scoped to secure coding practices.
Violations of any corporate policies may result in disciplinary measures up to and including termination.
Secure Development
Athena Studio has built a secure software development lifecycle (SDLC), including requirements like independent peer code review and automated testing. Non-standard changes go through a change management process that covers emergency changes and hotfixes. The agile nature of the process allows for engineers to follow their own release cycles, deploying continuous improvements to the Athena Studio application.
All code is managed in a version control repository, with branch protections in place. SAST and DAST are also in place. Access to source code requires MFA.
Third Parties
Athena Studio partners with third parties to provide key services. Third parties that handle customer personal data, also known as sub-processors, are continuously monitored in order to ensure that their security programs continue to meet Athena Studio’s standards. Athena Studio reassesses its subprocessors annually, which includes a review of their independent audit reports and penetration test reports. For the full list of Athena Studio’s subprocessors.
Vulnerability Management
Internal and external vulnerability scans are performed weekly. Identified vulnerabilities are remediated in accordance with severity.
Your Responsibility
Though Athena Studio is responsible for the vast majority of the security controls implemented to securing customer data and the application, our customers are responsible for securing their user accounts. This includes creating strong passwords, provisioning user accounts and permissions, and disabling accounts as needed.
Additionally, customers are responsible for determining the appropriateness of the data entered into the application. By default, Athena Studio handles limited customer PII (name and email). The sensitivity of the data that customers input to generate content is ultimately their responsibility. Customers should refrain from providing cardholder information, protected health information, and other types of sensitive, regulated information.
Conclusion
Ensuring the security and privacy of customer information is vital to our company mission. The success of our customers is at the core of what we do.
We hope this insight into our security program helps to build and maintain your trust in Athena Studio.
Faster outputs. Better outcomes.
Come see why leading businesses chose Athena Studio for better results using artificial intelligence.