Your data never touches plaintext.
Everything is encrypted, isolated, and auditable. Security isn't a feature we added — it's how OpenTracy was built from day one.
Security Architecture
Defense in depth at every layer. No shortcuts.
Encrypted by default
COREAll data is encrypted at rest and in transit. No exceptions, no opt-in required. Your models and traces are protected from the moment they enter our platform.
Tenant Isolation
COREEvery customer operates in a fully isolated environment. Your data is never shared, mixed, or accessible to other tenants — at any layer.
Bring Your Own Keys
ENTERPRISEUse your own encryption keys for data at rest. Full control over your encryption lifecycle, rotation, and revocation.
Private Deployment
ENTERPRISEDeploy OpenTracy entirely within your own network. Data never leaves your perimeter. Air-gapped mode available for regulated environments.
Security Posture
Comprehensive controls across every layer of the stack.
/// Data Protection
- [+]All data encrypted at rest (AES-256) and in transit (TLS 1.2+)
- [+]Customer-managed encryption keys
- [+]Automated backups with encryption and retention policies
- [+]Multi-region redundancy with automatic failover
- [+]Secure deletion with configurable retention
/// Access Control
- [+]Multi-factor authentication enforced
- [+]Dual authentication — token-based and key-based
- [+]API keys hashed and never stored in plaintext
- [+]Strong password policies enforced
- [+]Rate limiting on all API endpoints
- [+]Service-to-service authentication between internal components
/// Infrastructure
- [+]Private network — no public database access
- [+]Strict firewall rules at every layer
- [+]Internal traffic never routed through the public internet
- [+]Encrypted compute and storage volumes
- [+]Explicit origin allow-lists — no wildcard CORS
- [+]Infrastructure as Code — no manual changes, full auditability
/// Logging & Monitoring
- [+]Structured logging on all services
- [+]Access logs with IP, method, status, and latency
- [+]Authentication events logged with context
- [+]Failed login attempts tracked and flagged
- [+]Key operations (create, revoke) logged with audit trail
- [+]Configurable log retention policies
Compliance Roadmap
Building toward formal certifications.
SOC 2 Type II
Independent audit of security controls. Our practices are aligned — formal certification in progress.
GDPR
Data deletion, retention, and encryption already in place. Formal compliance documentation underway.
HIPAA
Encryption, logging, and access controls ready. BAA documentation on the roadmap.
ISO 27001
Security management practices aligned. Formal certification will follow SOC 2.
/// Trust Center
Available to customers and qualified prospects.
Need security details?
Our team responds within 24 hours with architecture diagrams, encryption details, and completed vendor questionnaires.
Your data. Your keys. Your network.
Have security requirements? Our team works directly with yours to meet them.
Responsible Disclosure
Found a vulnerability? Email security@opentracy.com