Security Practices

We take the security of your data seriously. This page describes the controls iron.sh uses to safeguard your data. If you have questions, contact [email protected].

Infrastructure

Our production environment runs on locked-down bare metal servers. All infrastructure changes are applied through Infrastructure as Code — there is no manual access to production systems. Access to production is strictly limited and regularly reviewed. We perform regular vulnerability scans across our infrastructure.

Data Protection

All sensitive data is encrypted at rest using industry-standard encryption. All data is encrypted in transit. Customer data is backed up regularly to ensure availability and durability.

Compliance

We are currently undergoing a SOC 2 Type I audit. We maintain continuous compliance monitoring through Vanta.

Vendor Management

All vendors we work with are required to maintain SOC 2 compliance.

Employee Security

All employees undergo background checks prior to joining.

Secure Development

We follow secure-by-design and privacy-by-design principles across our engineering organization.

Reporting a Vulnerability

If you believe you have found a security vulnerability, please report it to [email protected].