Security
Secure Cloud Infrastructure
SourceLink leverages AWS for a robust and secure foundation, supporting multi-provider SCM integration
Multi-Tenant Isolation
Our architecture employs strict tenant isolation, ensuring your data and processes are securely separated from other customers.
AWS Security Services
We harness AWS's advanced security services to fortify data protection and maintain compliance across all integrated SCM providers.
Encrypted Data Storage
All data, including SCM tokens, is encrypted at rest and in transit using industry-standard encryption protocols.
Security Compliance Framework
SourceLink's security measures are built on industry-leading standards and best practices
ISO/IEC 27001
Our information security management system is structured in alignment with ISO/IEC 27001, providing a comprehensive framework for managing and protecting sensitive information.
NIST 800-53
We apply security controls based on NIST 800-53 guidelines, adapting federal-grade security measures to protect your data and systems effectively.
SOC 2
Our security practices are designed with SOC 2 principles in mind, focusing on security, availability, and confidentiality to ensure trust and peace of mind for our customers.
SCM Integration Security
SourceLink ensures secure integration with multiple SCM providers for seamless SDLC automation
OAuth-based Authentication
We implement OAuth protocols to secure authentication and authorization processes across all supported SCM providers.
Secure Token Handling
Access tokens for SCM providers are securely managed and stored using advanced encryption techniques.
Automated Git Operations
Our system enables secure automation of git operations, maintaining integrity across your entire workflow.
Data Protection
SourceLink implements robust measures to protect your code and data across all integrated SCM platforms
Isolated Processing Environments
Code processing occurs in secure, isolated environments, preventing unauthorized access and ensuring consistency across SCM providers.
End-to-End Encryption
We employ end-to-end encryption for all data in transit and at rest, using state-of-the-art cryptographic protocols.
Ephemeral Data Handling
Your code is processed ephemerally, ensuring no persistent storage after analysis completion.
Access Controls and Auditing
SourceLink provides comprehensive access management and auditing capabilities
Fine-grained Access Control
Implement granular permissions to manage user access effectively across all integrated SCM platforms.
Extensive Audit Logging
Our system maintains detailed logs of all activities, supporting thorough security monitoring and compliance verification.
Continuous Security Monitoring
We employ ongoing security assessments and monitoring to proactively identify and address potential vulnerabilities.