logo

security

Security

The primary design constraint for Runops is to make sure your sensitive data never leaves your infrastructure. Credentials stay in your Secrets Management tool. Access results are redacted before they get sent to users.
We make sure every component of our infrastructure uses the highest security and compliance standards. Here is how every element of the Runops API infrastructure behaves:

Storage

All our storage mechanisms are encrypted. Additionally, data transferred to and from Runops’ backend database is encrypted using TLS.

Network

All our traffic uses HTTPS. All data transferred in and out of Runops is encrypted using hardened TLS. Runops is also protected by HTTP Strict Transport Security.

Compute

Runops uses Kubernetes with the highest standards of hardening. We use hardened VMs and container images. Our containers run using GKE Sandbox, powered by gVisor, improving isolation security beyond Docker.

Compliance

If you need help during compliance audits, please reach out. The Runops team has experience going through all the major certifications. We can help you get the data you need to certify the Runops architecture during audits. Below is an overview of how Runops impacts some certifications and regulations.

Summary

  • Credentials of your internal systems never leave your infrastructure.
  • Tasks results with potentially sensitive data are redacted before reaching Runops servers and the users.
  • Despite not accessing sensitive data, the Runops API applies the highest standards of security and compliance.