Security
How we secure Cipher
A security platform must hold itself to the highest standard. Cipher is built with defense-in-depth principles, transparent practices, and continuous validation.
Security practices
Infrastructure Security
Cipher's infrastructure runs on isolated, ephemeral environments. Exploit simulations execute in sandboxed containers that are destroyed after each verification — no customer code persists beyond the scan lifecycle.
Data Handling
Source code is encrypted in transit (TLS 1.3) and at rest (AES-256). Code is processed in memory during analysis and never stored permanently. Scan results are retained only for the duration specified by your plan's audit history window.
Access Controls
All internal systems enforce least-privilege access with RBAC. Authentication is handled via OAuth 2.0 with support for SSO/SAML on enterprise plans. Every access event is logged and auditable.
Compliance & certifications
Expected Q3 2026
Annual third-party assessment
EU data processing compliant
Certification roadmap initiated