Security

How we protect customer data

The controls behind our compliance posture. Encryption, identity, network isolation, access control, vulnerability management, and code provenance — every one operating today across every customer environment.

Data protection

Encryption, top to bottom

Encryption at rest

All persistent storage is encrypted with KMS-managed keys (AWS KMS, Azure Key Vault, GCP Cloud KMS). Customer-managed keys (CMK / BYOK) available on enterprise tier.

  • RDS, EBS, S3, EFS — KMS-encrypted by default
  • Backups inherit volume encryption and rotate automatically
  • No plaintext customer data in logs, snapshots, or temp files

Encryption in transit

TLS 1.2+ everywhere. HSTS preloaded. mTLS between control-plane services. Internal service mesh encrypts pod-to-pod traffic on EKS / AKS / GKE.

  • TLS 1.3 preferred where supported
  • Modern cipher suites only (no RC4, no 3DES, no SHA-1)
  • Public endpoints A+ on Qualys SSL Labs

Identity & access

Zero-trust by default

SSO + MFA

BetterAuth handles email/password with mandatory MFA on the platform. Workforce identity is Google Workspace (SAML/OIDC) with hardware-key MFA for engineers.

  • Customer SSO available on enterprise tier (SAML, OIDC)
  • TOTP and WebAuthn supported for end users
  • Session expiry, revocation, and device management built in

Least-privilege access

No standing production access. Engineers request just-in-time elevation through PIM-style flows; access is time-bounded, logged, and reviewed.

  • Per-customer cloud accounts (AWS Organizations / Azure subs / GCP projects)
  • IAM roles audited quarterly; unused roles removed
  • Customer-readonly roles available for assist sessions

Audit logging

CloudTrail, Azure Activity Log, and GCP Cloud Audit are enabled across every environment, shipped to immutable storage, and retained per customer policy.

  • Application-level audit logs for auth, billing, and admin actions
  • Tamper-evident retention (S3 Object Lock / immutable blob storage)
  • Customer-readable export available under NDA

Network & operations

Isolation, monitoring, response

Network isolation

Per-customer VPCs / VNets / GCP networks. Private subnets for all data tiers. No shared compute, no shared databases, no cross-customer data flow at the network layer.

Continuous monitoring

24/7 alerting on anomalies, failed auth bursts, and suspicious egress. PagerDuty escalation on P1 events. SIEM ingestion available where required.

Incident response

Documented runbooks, on-call rotation, and a 5-business-day postmortem commitment for every P1 incident. Customer Slack channel updates for affected services.

Vulnerability management

Find it. Fix it. Prove it.

Dependency & SAST scanning

Dependabot, GitHub Code Scanning (CodeQL), and Trivy run on every PR. Container images scanned before push. Critical CVEs trigger automated upgrade PRs.

Secret scanning

GitHub secret scanning + push protection on every repo. Pre-commit hooks block known secret patterns. Detected secrets are rotated immediately.

Penetration testing

Annual third-party penetration test plus continuous internal red-team exercises. Summary letter shareable; full report under NDA.

Code provenance

Supply-chain hygiene

Signed commits & tags

All production releases ship from signed Git commits and signed tags. Branch protection requires PR review, CI green, and signature verification.

Reproducible builds

CI builds are pinned to immutable container digests. Production images are content-addressed; rollback is a digest swap, not a rebuild.

SBOM & supply chain

CycloneDX SBOMs generated for every release. Provenance attestations (SLSA-aligned) on container images. Sub-processor list maintained on /trust.

Responsible disclosure

Found a security issue? Email security@fencepencil.com. We acknowledge within one business day, triage within three, and credit you in our hall of fame on resolution if you'd like.

PGP key on request. Please give us a reasonable window before public disclosure.

Bug bounty

No public bug bounty yet. We pay for impactful reports today on a discretionary basis and plan to formalize a program once SOC 2 Type II issues. Want early access? Tell us.

Get on the list