Book a Demo

SLayer v0.5 is live — the open-source semantic layer built for AI agents. View on GitHub →

Security built for enterprise-grade reporting

Motley adheres to industry best practices in cloud security. This  profile documents the controls protecting your data and systems — and  welcomes your feedback to ensure our approach aligns with your policies  and risk appetite.

GCP-native· TLS 1.2+ · AES-256· MFA-enforced · December 2025 version

How your data flows

Approve once. Delete anytime.

Every byte of client data is gated by explicit approval, encrypted in motion and at rest, and irreversibly erased when you ask.

Approve & ingest

Only client-approved, non-sensitive information enters the platform.

Aggregated analytics & usage metrics

Public content and approved internal tools

Filters configured per data classification

Process & retain

Data lives encrypted inside Google Cloud while it powers your reports.

Update models instantly through YAML or API without rebuilds or compilation steps.

Keys managed by Google Cloud KMS

Retention windows tuned to your policy

Delete on request

One formal request and we erase everything we hold for you.

Raw inputs, embeddings, derivative indices

Permanent and irreversible

Confirmation provided after completion

Data scope, lifecycle & LLM handling

  • Motley processes only client-approved, non-sensitive information, such as aggregated analytics, usage metrics, public content, and approved data from internal tools including databases, BI tools, and dashboards.

  • Ingestion filters are configured according to each client’s data-classification requirements to capture only approved fields and records.

  • Motley may store portions of client data relevant to slide decks and reports to support on-demand generation, and deletes this data upon formal client request.

  • Upon deletion, Motley permanently and irreversibly erases raw inputs, embeddings, derivative indices, and summaries from its systems.

Cloud infrastructure & encryption

  • Data processing occurs exclusively within Google Cloud Platform, GCP.

  • All data flows between client systems and Motley’s platform are protected via TLS 1.2+ encryption.

  • Data at rest is encrypted using AES-256, as provided by Google’s default encryption practices for GCP storage.

  • Security keys are managed by Google Cloud KMS.

  • Any backups are similarly securely encrypted.

Access control, authentication & secrets

  • Infrastructure and development access is strictly limited to engineering personnel and only as required to ensure functioning of the service.

  • Google Cloud IAM roles enforce least-privilege principles.

  • Multi-factor authentication, MFA, is mandated for all personnel accessing sensitive systems or data.

  • API keys and credentials are stored in encrypted form, with encryption keys managed in Google Cloud Secret Manager and regularly rotated.

  • Services retrieve secrets at runtime using a dedicated service account over TLS with a least-privilege “Secret Accessor” role.

Operational security, logging & monitoring

  • Motley adheres to secure coding practices, including mandatory code reviews for production code and minimal sensitive logging.

  • Employee workstations and laptops must have full-disk encryption enabled, up-to-date antivirus software with real-time protection, an active personal firewall, and automatic OS/application patching.

  • All application and infrastructure logs are maintained in Google Cloud Logging.

  • Logs are retained for operational troubleshooting for 30 days by default, with retention customizable based on client requirements.

  • Motley runs continuous security monitoring through Google Security Command Center for real-time threat detection and alerts.

Incident response

  • Motley aims to acknowledge critical incidents within 1 hour and resolve high-severity issues within 24 hours.

  • These targets are customizable based on client requirements.

  • The incident response process covers detection, containment, remediation, notification, and post-incident review.

  • Alerts are sent to the Motley team; temporary measures are taken to limit impact; the root cause is fixed; affected clients are informed; and lessons learned are identified.

  • Motley conducts incident-response drills and updates procedures at least twice a year, and immediately after any real incident.

Security testing, risk management & continuity

  • Motley uses automated dependency-vulnerability checks in CI/CD, secret scanning on every push, and reviewer checklists to block hard-coded credentials or unsafe patterns.

  • By Q1 2026, Motley plans to integrate lightweight SAST and fail builds on critical findings.

  • High-severity issues from any scanner are triaged within 48 hours and fixed according to Motley’s incident-response targets.

  • Motley conducts monthly lightweight security assessments of its codebase and cloud configuration, including third-party dependencies, cloud service configurations, IAM policies, and misconfiguration risks.

  • Identified risks are tracked in Motley’s issue tracker; high-severity findings are assigned an owner and remediation deadline.

  • All production databases and stores are backed up daily with GCP’s encrypted backups. Motley aims for an RTO of 4 hours and an RPO of 1 hour, revisiting these targets as infrastructure and client needs evolve.

Built on a trusted stack

The technologies behind every control

Google Cloud Platform
Cloud KMS
Cloud IAM
Secret Manager
Cloud Logging
Security Command Center
TLS 1.2+
AES-256
MFA
Encrypted backups
Where SLayer fits best

Designed for modern data workflows

SLayer works best in environments where queries are generated dynamically and reused across tools.