Security
Your security is our top priority. Here's how we protect your code and data.
Encryption
All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption.
Isolated Build Environments
Each build runs in an isolated environment with access only to your project's code and credentials. Build environments are destroyed after completion.
SOC 2 Compliance
We follow SOC 2 Type II security practices for enterprise-grade protection.
Secure Code Storage
Your synced code is stored in encrypted, isolated storage. Each user's data is completely separated with strict access controls.
Managed Build Infrastructure
Your code syncs to our secure cloud storage and builds run entirely on our managed infrastructure. You never need to configure CI/CD or expose credentials in your repositories. Our infrastructure is hosted on industry-leading cloud providers with multiple layers of security, including firewalls, intrusion detection, and DDoS protection.
Access Controls
We implement strict access controls and follow the principle of least privilege. All employee access to production systems is logged and audited.
Vulnerability Management
We conduct regular security assessments and penetration testing. Critical vulnerabilities are addressed within 24 hours.
Report a Vulnerability
If you discover a security vulnerability, please report it to security@electronpublish.com. We appreciate responsible disclosure and will respond within 48 hours.