Security is the product.

Trust is earned in the smallest decisions. Here's how DevGrid earns it, every release.

Architecture

Defense in depth, by design.

No single control is load-bearing. Every request crosses five independent layers — governance, network, platform, application, and data — each with its own owners, controls, and audit trail.

GovernanceNetworkPlatformApplicationData
Customer Data
Encrypted
01
Governance & people
Role-scoped access, periodic access reviews, mandatory security training at onboarding.
02
Network perimeter
Private VPC isolation, WAF, DDoS protection, no public ingress to the data plane.
03
Platform & infrastructure
Hardened baselines, signed container provenance, runtime monitoring.
04
Application
Static and dependency analysis on every PR. Peer review required to merge.
05
Data
AES-256 at rest, TLS 1.2+ in transit, full audit log of administrative actions.
Operating principles

Four rules we don’t bend.

These aren’t slogans — they’re load-bearing constraints. Each principle has a named owner, a measurable target, and shows up in our quarterly board review.

P · 01
Security by design

Threat models precede architecture diagrams. New services ship with a documented attack surface before merge.

P · 02
Least privilege

Access is scoped, time-bound, and reviewed. Standing admin rights are the exception, not the default.

P · 03
Transparent by default

If we don’t know it yet, we say so. Status, sub-processors, and changes are published — not buried behind a sales call.

P · 04
Customer data isn’t ours

It’s yours, held in trust. We don’t train models on it, mine it, or share it. Sub-processors are minimal and named.

Compliance

Building toward independent assurance.

We’re partway through formal certification and aligned to the frameworks our customers ask about most. Here’s exactly where we are.

SOC 2 Type II
Observation period active · report on track for issuance
In progress
GDPR & CCPA / CPRA
DPA available · documented data-handling processes
Aligned

Need an artifact today?

Even pre-certification, we publish what’s available and respond promptly to vendor questionnaires.

  • Security overview & architecture document
  • Data Processing Agreement (DPA)
  • Sub-processor list
Data protection

Encrypted everywhere. Always.

From the moment data leaves your browser to the moment it lands on disk, it’s wrapped in modern ciphers, anchored to keys you can rotate, revoke, or hold yourself.

Your client
Browser · SDK
TLS 1.3 · HSTS preload
Edge
WAF · DDoS
mTLS · SPIFFE
Data store
AES-256-GCM
In transit
TLS 1.2+ · modern ciphers

All public endpoints terminate with modern TLS and strict cipher suites. Internal service-to-service traffic is authenticated and encrypted.

At rest
AES-256 · managed KMS

Customer data is encrypted at rest with industry-standard algorithms. Encryption keys are managed through cloud-native KMS with regular rotation.

Secrets & keys
Scoped · rotated · audited

No long-lived secrets in source. Workload credentials are scoped and rotated automatically; sensitive operations require multi-party review.

Enterprise security

Securing our people & systems.

The strongest product perimeter doesn’t matter if the laptop building it is wide open. We hold the back office to the same bar as the platform.

Endpoint protection

Corporate devices are managed with disk encryption, endpoint detection, and automatic patching. Non-compliant devices are blocked from production access.

Identity & access

SSO and multi-factor authentication are enforced for internal systems. Access is scoped by role and reviewed periodically.

Security training

All employees complete security awareness training at onboarding and on a recurring cadence. Engineering teams cover secure-coding topics.

Vendor management

Third-party vendors handling customer data go through security review before onboarding, sign a DPA, and are reassessed on an ongoing basis.

Data privacy

Your data. Your control.

Privacy is a discipline, not a banner. We minimize what we collect, name every sub-processor, give you the controls — and never train models on your data.

Your guarantees

What we commit to

  • Your data is never used to train AI models — ours or anyone else’s.
  • Data Processing Agreement available, including Standard Contractual Clauses for EEA & UK transfers.
  • Export and deletion of your data on request.
  • Notice of sub-processor changes.
Sub-processors4 active
VendorPurposeRegion
AWAmazon Web Servicescloud infrastructureus
A0Auth0authenticationus
SESentryerror monitoringus
LRLogRocketsession diagnosticsus
updated May 2026
Coordinated disclosure

Found something? Tell us.

If you believe you’ve discovered a security issue in DevGrid, we’d like to hear about it. Email us with details and we’ll acknowledge promptly and keep you updated until it’s resolved.

Email security@devgrid.io
What to include steps to reproduce · impact · your contact
Frequently asked

Questions, answered.

If you’re filling out a vendor questionnaire, start here — most answers are below, and the rest are in the Trust Center.

Where is customer data stored?+
Do you train AI models on customer data?+
Where are you with SOC 2?+
How do you handle incident response?+
Talk to security

Still have questions?
We have answers.

For procurement, vendor reviews, custom security requirements, or anything not covered here — reach out directly. A security engineer will respond, not a form.