Security is at the core of what we do. As a security vendor helping our customers secure their application stacks, we care deeply about our own security and compliance.
Secure By Default Policies
Operant’s internal security and risk management is guided by our own product pillar of being secure by default. This high level goal permeates all of the policies and controls we have in place in the product and across the company.
Our secure by default policies are backed by the following principles:
Least privilege: The principle of least privilege is enforced all the way from our development and production infrastructure to the product layer and APIs. This ensures that internal developers, employees, customer users, and processes always follow RBAC/ ABAC rules for access to different resources.
Fine grained Access Controls: Access needed by users and processes is restricted to a minimum using controls such as cloud IAM policies attached to specific roles for internal developers and RBAC roles when accessing the product for end users. Periodic access reviews across all internal cloud and SaaS accounts ensure that access permissions are at the minimum needed level.
Consistent enforcement: Security policies are enforced consistently across all environments of Operant using IaC and Policies as Code where security is baked into our CI/CD processes.
Adaptive Controls: Operant’s security policies are iterative and adapt as users, processes, and the accesses they require change over time.
Data Security and Protection
Encryption
Backups and Retention
Access Controls
Product Security
Software development
Vulnerability Scanning
API Security
Access Controls
Endpoint Security
Responsible Disclosure
We take the security of our product and customer data very seriously. Get in touch at security@operant.ai to report any security concerns or vulnerabilities.