Security

Security at Ops Atlas

Your infrastructure data is sensitive. We take security seriously at every level.

Self-Hosted = Full Control

With the open-source self-hosted version, your data never leaves your infrastructure. You maintain complete control over security, access, and compliance.

Our Security Practices

🔐

Encryption

  • AES-256 encryption at rest
  • TLS 1.3 for all data in transit
  • End-to-end encryption for sensitive data
🏰

Infrastructure

  • SOC 2 Type II certified infrastructure
  • Regular penetration testing
  • DDoS protection
  • Geo-redundant backups
🔑

Access Control

  • Role-based access control (RBAC)
  • Multi-factor authentication (MFA)
  • SSO/SAML integration
  • Audit logging
📋

Compliance

  • GDPR compliant
  • CCPA compliant
  • SOC 2 Type II (Cloud)
  • Data Processing Agreements available

🐛 Responsible Disclosure

We appreciate security researchers who help keep Ops Atlas safe. If you discover a vulnerability, please report it responsibly.

Report vulnerabilities to:

security@opsatlas.io

We aim to respond within 48 hours and will work with you to understand and resolve the issue.

Security Questions?

Need our security documentation, SOC 2 report, or have compliance questions?

Contact Security Team