
Your data is our priority
Cedric is built with security-first principles at every layer. We never see or store your Google password, request only the minimum permissions needed, and give you full control over your data at all times.
Built secure from the ground up
Every component of Cedric is designed with enterprise-grade security standards.
OAuth-only authentication
We never see or store your Google password. Authentication is handled entirely through Google’s OAuth 2.0 protocol with encrypted token storage.
- Your Google password is never seen or stored
- Industry-standard OAuth 2.0 flow
- Token encryption at rest
- Automatic token refresh
Authentication
Connected
No passwords stored
Minimal permissions
We follow the principle of least privilege. Cedric requests only the specific Google API scopes needed to function — nothing more.
- Read reviews only
- Publish replies (optional scope)
- No access to email, drive, or contacts
- No access to financials or ads
Requested scopes
Full revocation control
You maintain complete control. Revoke Cedric’s access instantly from your Google account settings, no questions asked.
- Instant revocation from Google
- No data retained after disconnection
- No lock-in or exit penalties
- Clear data deletion process
Connection status
Cedric App
Linked 14 days ago
One click to disconnect
Infrastructure security
Cedric runs on enterprise-grade cloud infrastructure with multiple layers of protection at every level of the stack.
- TLS 1.3 encryption in transit
- AES-256 encryption at rest
- Organisation-scoped data isolation
- Regular automated backups
TLS 1.3
Encryption in transit
AES-256
Encryption at rest
Isolation
Organisation-scoped data
Multiple encryption layers protecting your data
Audit trails
Every action in Cedric is logged with a complete audit trail. Know who did what, and when — with exportable reports.
- Full reply approval history
- Login and access logs
- Configuration change tracking
- Exportable audit reports
Activity log
Reply posted to Google
2 min ago
Draft approved by Sarah M.
5 min ago
Review flagged for review
12 min ago
New 3-star review received
18 min ago
Access controls
Granular role-based access ensures your team only sees and does what they’re supposed to. Lock down by role and location.
- Role-based permissions
- Per-location access controls
- Approval chain workflows
- Admin-only configuration
Role hierarchy
Security by design, not afterthought
Transparency first
You can see exactly what permissions Cedric has, what data it accesses, and what actions it takes. No hidden behaviour, no surprises.
Approve-first by default
Nothing is published without your explicit approval. Autopilot auto-posts to Google only when enabled and within your defined rules and guardrails.
Zero-trust architecture
Every request is authenticated and authorized. Internal services communicate over encrypted channels with mutual TLS verification.
Data minimisation
We only collect and store what’s necessary to provide the service. Review data is used solely for generating replies and analytics — nothing else.
Your reputation is safe with Cedric
We understand that reputation management requires trust. That's why we've built Cedric to be the most transparent, secure, and controllable platform in the space.
Common security questions
Ready to protect your reputation, securely?
Enterprise-grade security. Full approval control. Zero Google passwords stored.