Security
Common questions about data security and privacy. --- Your code is protected with multiple layers: | Layer | Protection | |-------|------------| | Transit |...
Security FAQ
Common questions about data security and privacy.
Data Protection
How is my code protected?
Your code is protected with multiple layers:
| Layer | Protection |
|---|---|
| Transit | TLS 1.3 encryption |
| Storage | AES-256 encryption at rest |
| Access | Role-based access control |
| Audit | Full audit logging |
| Network | VPC isolation, firewalls |
Who can access my code?
- Your team: Members in your organization
- BlockSecOps: Only for support purposes, with your permission
- Third parties: Never
Is my code used for AI training?
No. Your code is:
- Never used to train models
- Never shared with third parties
- Never included in datasets
- Deleted according to retention policy
Data Storage
Where is my data stored?
Default regions:
- US: AWS us-east-1, us-west-2
- EU: AWS eu-west-1 (Enterprise option)
Enterprise plans can specify data residency requirements.
How long is data retained?
| Data Type | Default Retention |
|---|---|
| Scan results | 1 year |
| Source code | 30 days |
| Audit logs | 2 years |
| Account data | Until deletion |
Can I change retention settings?
Enterprise plans can customize:
- Shorter retention (delete immediately after scan)
- Longer retention (extended history)
- Custom per-project settings
Can I delete my data?
Yes, immediately:
- Individual contracts: Delete from Contracts page
- Individual scans: Delete from Scans page
- All data: Account deletion in Settings
Deletion is permanent and cannot be undone.
Compliance
Is BlockSecOps SOC 2 compliant?
Yes. BlockSecOps is SOC 2 Type II certified. Request our SOC 2 report via [email protected].
Is BlockSecOps GDPR compliant?
Yes. We comply with GDPR including:
- Data processing agreements
- Right to access/delete
- Data portability
- Breach notification
- Privacy by design
Do you offer a DPA?
Yes. Enterprise plans include a Data Processing Agreement. Contact sales for details.
What about HIPAA, PCI, etc.?
Smart contracts typically don't involve regulated data types. Contact us if you have specific compliance requirements.
Authentication
What authentication methods are available?
| Method | Description |
|---|---|
| Email/password | Standard authentication |
| Google OAuth | Sign in with Google |
| GitHub OAuth | Sign in with GitHub |
| Microsoft OAuth | Sign in with Microsoft |
| Web3 wallet | MetaMask, WalletConnect (SIWE) |
| SSO/SAML | Enterprise single sign-on |
Is 2FA available?
Yes. Enable two-factor authentication:
- Go to Settings → Security
- Click Enable 2FA
- Scan QR code with authenticator app
- Enter confirmation code
What about SSO?
Enterprise plans support:
- SAML 2.0
- OpenID Connect
- Okta, Azure AD, Google Workspace
- Custom IdP integration
API Security
How are API keys secured?
- Keys are hashed (not stored in plain text)
- Shown only once at creation
- Can be scoped with minimal permissions
- Support expiration dates
- IP allowlisting available (Enterprise)
What permissions can API keys have?
Granular scopes:
contracts:read,contracts:writescans:read,scans:writevulnerabilities:read,vulnerabilities:writeorganizations:read,organizations:write- And more...
How do I rotate API keys?
- Create new key with same permissions
- Update applications to use new key
- Verify functionality
- Revoke old key
We recommend rotating production keys every 90 days.
Network Security
Is data encrypted in transit?
Yes. All connections use:
- TLS 1.3
- Strong cipher suites
- HSTS enabled
- Certificate pinning (mobile)
What IPs does BlockSecOps use?
Webhook and API callback IPs:
52.45.123.0/24
54.87.234.0/24
Enterprise plans receive dedicated IP ranges.
Do you support VPN/private connectivity?
Enterprise plans can use:
- AWS PrivateLink
- VPN tunnels
- Direct Connect
Scanning Security
Is scanning isolated?
Yes. Each scan runs in:
- Isolated container
- Separate network namespace
- Limited resources
- Auto-terminated after completion
Can contracts be executed during scanning?
Scanners analyze code statically and symbolically. For fuzz testing (Echidna, Medusa):
- Runs in sandboxed environment
- No network access
- No persistent state
- Cannot affect external systems
What about malicious code in uploads?
Uploads are:
- Scanned for known malware patterns
- Sandboxed during analysis
- Never executed on host systems
- Quarantined if suspicious
Incident Response
What happens if there's a breach?
Our incident response includes:
- Immediate containment
- Investigation and root cause
- Customer notification (within 72 hours for GDPR)
- Remediation
- Post-incident review
How do I report a security issue?
Report security vulnerabilities to:
- Email: [email protected]
- Response: Within 24 hours
- Bug bounty: Available for qualifying issues
Is there a bug bounty program?
Yes. We reward responsible disclosure:
- Critical: Up to $10,000
- High: Up to $5,000
- Medium: Up to $1,000
- Low: Recognition
Contact [email protected] for details.
On-Premise
Can I run BlockSecOps on my infrastructure?
Yes, Enterprise plans offer:
- On-premise deployment
- Private cloud hosting
- Air-gapped environments
- Full data control
What are the requirements?
On-premise requires:
- Kubernetes cluster (1.25+)
- 8+ CPU cores, 32GB+ RAM
- 100GB+ storage
- Network access for updates (or air-gap package)
Contact sales for detailed requirements.
Vendor Security
How do you vet third-party tools?
Scanners are:
- Open source and auditable
- Run in isolated containers
- Cannot access customer data
- Regularly updated and patched
What about supply chain security?
We implement:
- Signed container images
- SBOM (Software Bill of Materials)
- Dependency scanning
- Regular security audits
Next Steps
- Data Retention - Manage your data
- API Keys - Secure API access
- Enterprise - Advanced security options