Legal

Security Overview

Last updated: January 1, 2025

Our Commitment to Security

At Terragate, security is not an afterthought it's built into everything we do. We understand that our customers trust us with their critical infrastructure configurations, and we take that responsibility seriously.

Infrastructure Security

Our platform is built on secure, enterprise-grade infrastructure: • Hosted on AWS with multi-region redundancy • All data encrypted at rest using AES-256 encryption • All data encrypted in transit using TLS 1.3 • Regular security audits and penetration testing • SOC 2 Type II compliance (in progress) • ISO 27001 certification (in progress)

Application Security

We implement comprehensive application security measures: • Secure development lifecycle (SDLC) • Regular dependency vulnerability scanning • Static and dynamic code analysis • Web Application Firewall (WAF) protection • DDoS mitigation • Rate limiting and abuse prevention

Access Control

We enforce strict access control policies: • Role-based access control (RBAC) • Multi-factor authentication (MFA) support • Single Sign-On (SSO) integration • Session management and timeout controls • Audit logging of all access and changes • Principle of least privilege for all systems

Data Protection

Your data is protected through multiple layers: • Logical separation of customer data • Regular automated backups • Point-in-time recovery capabilities • Data retention policies • Secure data deletion procedures • No access to customer data without explicit permission

Credential Management

We handle your cloud credentials with extreme care: • Credentials are encrypted using envelope encryption • Never stored in plain text or logs • Access is strictly limited and audited • Support for temporary credentials and role assumption • Integration with cloud provider secret managers • Regular credential rotation recommendations

Network Security

Our network is protected by: • Virtual Private Cloud (VPC) isolation • Network segmentation and micro-segmentation • Intrusion detection and prevention systems • Real-time threat monitoring • Regular vulnerability assessments • Strict firewall rules and security groups

Incident Response

We have a comprehensive incident response plan: • 24/7 security monitoring • Defined incident classification and escalation procedures • Rapid response team for security incidents • Customer notification within 72 hours of confirmed breach • Post-incident analysis and remediation • Regular incident response drills

Employee Security

Our team follows strict security practices: • Background checks for all employees • Security awareness training • Secure coding training for developers • Access based on job requirements • Regular security policy reviews • Signed confidentiality agreements

Compliance

We are committed to meeting industry standards: • GDPR compliant • CCPA compliant • SOC 2 Type II (in progress) • ISO 27001 (in progress) • Regular third-party security audits

Vulnerability Disclosure

We welcome responsible security research: • Report vulnerabilities to security@terragate.io • We aim to respond within 48 hours • No legal action for good-faith research • Recognition for valid security reports • Please do not access customer data during testing

Contact Security Team

For security-related inquiries or to report a vulnerability: Email: security@terragate.io PGP Key: Available upon request