SOC 2 Type II Certified โ€ข ISO 27001 Compliant

Security built into
every commit

We engineer security into the foundation of .git. Zero-trust architecture, end-to-end encryption, and continuous auditing protect your codebase and team.

How we secure your code

Our security model is designed around defense-in-depth, least privilege, and continuous verification.

๐Ÿ”

Zero-Trust Architecture

Every request is authenticated, authorized, and encrypted. No implicit trust between services, users, or network segments.

๐Ÿ”‘

End-to-End Encryption

Data encrypted in transit (TLS 1.3) and at rest (AES-256). Customer-managed keys available for enterprise plans.

๐Ÿ›ก๏ธ

Continuous Vulnerability Scanning

Automated SAST, DAST, and dependency scanning across all repos. Critical CVEs patched within 24 hours.

๐Ÿ”

Immutable Audit Logs

Every action logged to an append-only, tamper-evident ledger. Export to SIEM or query in real-time.

๐Ÿงฌ

Supply Chain Security

SIGSTORE signing, SBOM generation, and dependency pinning to prevent malicious package injection.

๐Ÿ‘ฅ

Identity & Access Control

Granular RBAC, SSO/SAML, SCIM provisioning, and just-in-time access with automatic session revocation.

Hardened by design

Our infrastructure follows industry-leading security baselines and automated compliance enforcement.

๐ŸŒ Network Security

  • DDoS mitigation with Cloudflare & AWS Shield
  • WAF with custom rule sets & bot management
  • Private VPCs with strict egress filtering
  • Isolated runtime environments per tenant

โ˜๏ธ Cloud & Container Security

  • Kubernetes hardening (CIS Benchmarks)
  • Image scanning & runtime threat detection
  • Secrets management via HashiCorp Vault
  • Multi-region failover & disaster recovery

๐Ÿงช Development Security

  • Mandatory code review for all security patches
  • Automated policy-as-code enforcement
  • Penetration testing by third-party firms quarterly
  • Secure SDLC with threat modeling per feature

Certified & audited

We maintain compliance with global standards to ensure your data meets the highest regulatory requirements.

๐Ÿ›ก๏ธ

SOC 2 Type II

Annual audits by independent CPA firms covering security, availability, and confidentiality.

Certified
๐Ÿ“œ

ISO 27001

Internationally recognized information security management system (ISMS) certification.

Certified
๐Ÿ‡ช๐Ÿ‡บ

GDPR Ready

Full data subject rights support, regional data residency, and DPA templates for customers.

Compliant
๐Ÿฅ

HIPAA

BAA available for covered entities. PHI handled with encryption and strict access controls.

Available
๐Ÿ›

Vulnerability Disclosure Program

We welcome responsible disclosure of security vulnerabilities. Our VDP ensures researchers are rewarded and issues are resolved quickly.

Step 1

Report

Submit findings via our secure portal or email security@git.dev

Step 2

Triaging

Our security team acknowledges receipt within 24 hours

Step 3

Resolution

Issues patched based on severity. Critical fixes deployed within 72h

Step 4

Recognition

Hall of Fame listing & bounty rewards for valid reports

Scope: *.git.dev, api.git.dev, git.dev, and all hosted infrastructure. Out of scope: phishing, DDoS, social engineering.

Prepared for any event

Our IR process is practiced, documented, and continuously improved through post-mortems.

๐Ÿšจ Detection & Alerting

24/7 monitoring with automated anomaly detection. Critical alerts route to on-call engineers within minutes.

๐Ÿ“‹ Playbooks & Runbooks

Pre-approved response procedures for common scenarios. Regular tabletop exercises to maintain readiness.

๐Ÿ“ข Customer Communication

Transparent, timely updates via status page and direct channels. No hidden outages or silent failures.

๐Ÿ”„ Post-Incident Review

Blameless post-mortems within 5 business days. Action items tracked to closure with public updates.

Security questions answered

Where is my data stored?

Data is stored in geo-redundant AWS regions (US-EAST-1, EU-WEST-1, AP-SOUTH-1). Enterprise customers can select data residency. All storage is encrypted at rest with AES-256.

Can I use my own encryption keys?

Yes. Enterprise plans support Customer-Managed Keys (CMK) via AWS KMS or HashiCorp Vault. You retain full control over key rotation and revocation.

How do you handle third-party dependencies?

All dependencies are scanned via Snyk and Dependabot. We maintain a locked vendor directory and require dual-approval for new third-party integrations.

What happens during a security incident?

We follow a defined IR lifecycle: Detect โ†’ Contain โ†’ Eradicate โ†’ Recover โ†’ Learn. Customers are notified via status.git.dev and direct email for incidents affecting their data.

Do you support SSO & SCIM?

Yes. Pro and Enterprise plans include SAML 2.0 SSO, SCIM 2.0 for automated user provisioning, and just-in-time access provisioning.

Questions about our security?

Our security team is available to answer technical questions, review architectures, or discuss custom compliance requirements.