Security
Security at Ops Atlas
Your infrastructure data is sensitive. We take security seriously at every level.
Self-Hosted = Full Control
With the open-source self-hosted version, your data never leaves your infrastructure. You maintain complete control over security, access, and compliance.
Our Security Practices
🔐
Encryption
- AES-256 encryption at rest
- TLS 1.3 for all data in transit
- End-to-end encryption for sensitive data
🏰
Infrastructure
- SOC 2 Type II certified infrastructure
- Regular penetration testing
- DDoS protection
- Geo-redundant backups
🔑
Access Control
- Role-based access control (RBAC)
- Multi-factor authentication (MFA)
- SSO/SAML integration
- Audit logging
📋
Compliance
- GDPR compliant
- CCPA compliant
- SOC 2 Type II (Cloud)
- Data Processing Agreements available
🐛 Responsible Disclosure
We appreciate security researchers who help keep Ops Atlas safe. If you discover a vulnerability, please report it responsibly.
Report vulnerabilities to:
security@opsatlas.ioWe aim to respond within 48 hours and will work with you to understand and resolve the issue.
Security Questions?
Need our security documentation, SOC 2 report, or have compliance questions?
Contact Security Team