Security Policy

How we protect your code and data

Our Security Commitment

At QODRYX, security is not an afterthought—it's foundational to everything we build. As a DevOps security platform, we hold ourselves to the highest security standards. This document outlines our security practices, compliance certifications, and how we protect your data.

Security-First Architecture

QODRYX is built with security-first principles. We practice what we preach—all 8 of our security features are implemented in our own platform.

Infrastructure Security

Cloud Infrastructure

  • Multi-Cloud Architecture: Distributed across AWS, GCP, and Azure
  • Data Centers: SOC 2 Type II certified facilities
  • Geographic Distribution: EU, US, and Asia-Pacific regions
  • Network Isolation: VPC isolation with strict firewall rules
  • DDoS Protection: Enterprise-grade protection at all layers

Server Security

  • Hardened OS images with minimal attack surface
  • Automated security patching within 24 hours of critical CVEs
  • Host-based intrusion detection (HIDS)
  • No public SSH access—all management via secure bastion
  • Immutable infrastructure with automated rebuilds

Data Protection

Encryption

Encryption at Rest

AES-256 encryption for all stored data, including databases, backups, and logs

Encryption in Transit

TLS 1.3 for all connections, with HSTS and certificate pinning

Key Management

AWS KMS / GCP Cloud KMS with automatic key rotation

Secrets Management

HashiCorp Vault for secrets with zero plaintext storage

Data Isolation

  • Tenant Isolation: Complete logical separation between customers
  • Database Segregation: Separate schemas per organization
  • Code Processing: Ephemeral containers destroyed after each scan
  • No Code Storage: Your code is never permanently stored on our servers

Data Retention

Data TypeRetention PeriodNotes
Source CodeNot retainedProcessed in memory, never stored
Scan Results1 yearConfigurable per plan
Workflow Logs90 days - 1 yearVaries by plan
Audit Logs1-7 yearsPer compliance requirements
Account DataUntil deletion14-day grace period after deletion

Application Security

Secure Development

  • Code Review: All changes require peer review
  • SAST/DAST: Automated security scanning on every commit
  • Dependency Scanning: Continuous monitoring for vulnerable packages
  • Secret Scanning: Pre-commit hooks prevent secret exposure
  • Penetration Testing: Annual third-party assessments

Authentication & Authorization

  • Password Requirements: Minimum 12 characters, complexity enforced
  • 2FA/MFA: Available for all accounts, required for Enterprise
  • SSO/SAML: Enterprise SSO with major providers
  • Session Management: Configurable timeouts, secure tokens
  • RBAC: Fine-grained role-based access control

API Security

  • OAuth 2.0 and API key authentication
  • Rate limiting to prevent abuse
  • Request signing and validation
  • Audit logging of all API calls
  • IP whitelisting (Enterprise)

Compliance & Certifications

SOC 2 Type II

Certified

GDPR

Compliant

ISO 27001

In Progress

HIPAA

Available

PCI DSS

Compliant

CCPA

Compliant

GDPR Compliance

  • EU data residency option (Frankfurt, Ireland)
  • Data Processing Agreement (DPA) available
  • Right to access, rectify, and delete your data
  • Data portability in standard formats
  • Privacy by design principles

Incident Response

Our Process

  1. Detection: 24/7 monitoring with automated alerting
  2. Triage: Security team assesses severity within 15 minutes
  3. Containment: Immediate action to limit impact
  4. Investigation: Root cause analysis and forensics
  5. Recovery: Restore services and implement fixes
  6. Communication: Notify affected customers per SLA
  7. Post-Mortem: Document lessons learned and improvements

Notification Timeline

SeverityInitial NotificationUpdates
CriticalWithin 1 hourEvery 2 hours
HighWithin 4 hoursEvery 6 hours
MediumWithin 24 hoursDaily

Vulnerability Disclosure

We maintain a responsible disclosure program for security researchers:

Reporting a Vulnerability

  1. Email security@qodryx.com with details
  2. Include steps to reproduce the issue
  3. Do not publicly disclose until we've addressed it
  4. We'll acknowledge within 24 hours
  5. We target fixes within 90 days for critical issues

Bug Bounty Program

We offer rewards for responsibly disclosed vulnerabilities:

  • Critical: $1,000 - $5,000
  • High: $500 - $1,000
  • Medium: $100 - $500
  • Low: Recognition and swag

Employee Security

  • Background Checks: All employees undergo thorough screening
  • Security Training: Mandatory annual security awareness training
  • Access Control: Least-privilege access with regular reviews
  • Device Security: Encrypted laptops, MDM, endpoint protection
  • Clean Desk Policy: No sensitive data on physical media

Physical Security

  • We don't operate our own data centers
  • Cloud providers handle physical security
  • AWS, GCP, and Azure facilities are SOC 2 certified
  • 24/7 security, biometric access, video surveillance

Business Continuity

Availability

  • SLA: 99.9% uptime guarantee (Enterprise: 99.99%)
  • Redundancy: Multi-region deployment with automatic failover
  • Backups: Continuous with point-in-time recovery
  • DR Testing: Quarterly disaster recovery drills

Status & Communication

Monitor service status at status.qodryx.com. Subscribe for real-time incident notifications.

Security Best Practices for Users

Recommendations

  • Enable two-factor authentication on your account
  • Use unique, strong passwords or a password manager
  • Review connected applications regularly
  • Rotate API keys periodically (every 90 days)
  • Use scoped API keys with minimum required permissions
  • Monitor your audit logs for suspicious activity

Contact Security Team

For security questions, concerns, or to report vulnerabilities:

Next Steps