Security
Last updated: January 2026
1. Our Security Commitment
At Inverra, security is not an afterthought—it's built into everything we do. We understand that you trust us with your critical business data, and we take that responsibility seriously. This page outlines our comprehensive security measures.
2. Infrastructure Security
Cloud Infrastructure
Hosted on enterprise-grade cloud infrastructure with SOC 2 Type II certification, ensuring the highest standards of security and availability.
Network Protection
Advanced firewalls, DDoS protection, and intrusion detection systems monitor and protect our infrastructure 24/7.
3. Data Encryption
3.1 Encryption in Transit
All data transmitted between your browser and our servers is encrypted using TLS 1.3, the latest and most secure transport layer protocol. We enforce HTTPS across all connections.
3.2 Encryption at Rest
Your data is encrypted at rest using AES-256 encryption, the same standard used by governments and financial institutions worldwide. Database backups are also encrypted.
4. Access Controls
Authentication & Authorization
- Secure authentication with encrypted password storage
- Role-based access control (RBAC) for team management
- Session management with automatic timeout
- API key authentication for integrations
5. Application Security
- Secure Development: We follow secure coding practices and conduct regular code reviews
- Dependency Management: Automated scanning for vulnerabilities in third-party libraries
- Input Validation: All user inputs are validated and sanitized to prevent injection attacks
- CSRF Protection: Cross-site request forgery protection on all forms
- XSS Prevention: Content Security Policy and output encoding to prevent cross-site scripting
6. Data Protection
6.1 Backups
We maintain regular automated backups of all data. Backups are encrypted and stored in geographically separate locations to ensure data durability and disaster recovery capability.
6.2 Data Isolation
Each organization's data is logically isolated using row-level security policies. This ensures that users can only access data belonging to their organization.
7. Monitoring & Incident Response
24/7 Monitoring
Continuous monitoring of systems, applications, and security events with automated alerting for anomalies.
Incident Response
Documented incident response procedures with defined escalation paths and communication protocols.
8. Compliance
Our security practices align with major compliance frameworks:
- GDPR: Full compliance with European data protection regulations
- SOC 2: Infrastructure hosted on SOC 2 certified cloud providers
- ISO 27001: Security practices aligned with ISO 27001 standards
9. Employee Security
- Background checks for all employees with access to systems
- Regular security awareness training
- Principle of least privilege for access permissions
- Secure workstations with encryption and endpoint protection
10. Vendor Security
We carefully vet all third-party vendors and partners. We require security assessments and data processing agreements before integrating any external services.
11. Security Updates
We continuously monitor for security vulnerabilities and apply patches promptly. Critical security updates are prioritized and deployed as quickly as possible.
12. Responsible Disclosure
We welcome security researchers to report vulnerabilities responsibly. If you discover a security issue, please report it to security@inverra.app. We commit to:
- Acknowledging your report within 48 hours
- Providing updates on our investigation
- Not pursuing legal action against good-faith researchers
13. Contact
For security-related questions or to report a vulnerability, please contact our security team at security@inverra.app.