Skip to content
CedricCedric
Security

Your data is our priority

Cedric is built with security-first principles at every layer. We never see or store your Google password, request only the minimum permissions needed, and give you full control over your data at all times.

Security architecture

Built secure from the ground up

Every component of Cedric is designed with enterprise-grade security standards.

OAuth-only authentication

We never see or store your Google password. Authentication is handled entirely through Google’s OAuth 2.0 protocol with encrypted token storage.

  • Your Google password is never seen or stored
  • Industry-standard OAuth 2.0 flow
  • Token encryption at rest
  • Automatic token refresh

Authentication

Connected

No passwords stored

Minimal permissions

We follow the principle of least privilege. Cedric requests only the specific Google API scopes needed to function — nothing more.

  • Read reviews only
  • Publish replies (optional scope)
  • No access to email, drive, or contacts
  • No access to financials or ads

Requested scopes

Read reviews
Post replies
Email access
Drive access

Full revocation control

You maintain complete control. Revoke Cedric’s access instantly from your Google account settings, no questions asked.

  • Instant revocation from Google
  • No data retained after disconnection
  • No lock-in or exit penalties
  • Clear data deletion process

Connection status

Connected to Google
C

Cedric App

Linked 14 days ago

One click to disconnect

Infrastructure security

Cedric runs on enterprise-grade cloud infrastructure with multiple layers of protection at every level of the stack.

  • TLS 1.3 encryption in transit
  • AES-256 encryption at rest
  • Organisation-scoped data isolation
  • Regular automated backups

TLS 1.3

Encryption in transit

AES-256

Encryption at rest

Isolation

Organisation-scoped data

Multiple encryption layers protecting your data

Audit trails

Every action in Cedric is logged with a complete audit trail. Know who did what, and when — with exportable reports.

  • Full reply approval history
  • Login and access logs
  • Configuration change tracking
  • Exportable audit reports

Activity log

Reply posted to Google

2 min ago

Draft approved by Sarah M.

5 min ago

Review flagged for review

12 min ago

New 3-star review received

18 min ago

Access controls

Granular role-based access ensures your team only sees and does what they’re supposed to. Lock down by role and location.

  • Role-based permissions
  • Per-location access controls
  • Approval chain workflows
  • Admin-only configuration

Role hierarchy

OwnerFull access
AdminManage team & settings
MemberDraft & approve replies
ViewerRead-only access
Design principles

Security by design, not afterthought

Transparency first

You can see exactly what permissions Cedric has, what data it accesses, and what actions it takes. No hidden behaviour, no surprises.

Approve-first by default

Nothing is published without your explicit approval. Autopilot auto-posts to Google only when enabled and within your defined rules and guardrails.

Zero-trust architecture

Every request is authenticated and authorized. Internal services communicate over encrypted channels with mutual TLS verification.

Data minimisation

We only collect and store what’s necessary to provide the service. Review data is used solely for generating replies and analytics — nothing else.

Our commitment

Your reputation is safe with Cedric

We understand that reputation management requires trust. That's why we've built Cedric to be the most transparent, secure, and controllable platform in the space.

0
Google passwords stored
0%
Approval control
Instant
Access revocation
Security FAQ

Common security questions

Get started

Enterprise-grade security. Full approval control. Zero Google passwords stored.

30-day free trialNo credit card requiredCancel anytime