Security
Not a feature, not an add-on. Every layer of Apployd is built with security as the default.
Every secret is encrypted at rest with AES-256-GCM and a unique IV. Decryption happens only at container injection time.
All application containers run with read-only root filesystems by default, preventing runtime tampering and persistence attacks.
Granular RBAC with owner, admin, developer, and viewer roles. Scope permissions per project, per team.
Every action β deploys, secret changes, team modifications β is logged with actor, timestamp, and IP for full traceability.
Each project runs in its own Docker network. Inter-project communication is blocked by default with strict iptables rules.
Build artifacts run on distroless or Alpine-based images with no shell, no package manager, minimal attack surface.
Practices
Compliance
Apployd is not currently HIPAA-compliant and does not provide a default Business Associate Agreement (BAA). Do not use the platform for PHI/HIPAA-regulated workloads unless a separate written agreement explicitly states support.
Architecture
βββββββββββββββββββββββββββββββββββββββββββββββββββ β HTTPS / TLS β β βββββββββββ ββββββββββββ ββββββββββββββββ β β β DashboardββββΆβ API (mTLS)ββββΆβ PostgreSQL β β β β (Next) β β (Fastify) β β (encrypted) β β β βββββββββββ βββββββ¬βββββ ββββββββββββββββ β β β β β βββββββββΌββββββββ β β β Deploy Engine β β β β (isolated) β β β βββββββββ¬ββββββββ β β β β β βββββββββββββββΌβββββββββββββββ β β β Docker Network (per-proj) β β β β ββββββββ ββββββββ βββββββ β β β β β app β β app β β app β β β β β β (ro) β β (ro) β β(ro) β β β β β ββββββββ ββββββββ βββββββ β β β ββββββββββββββββββββββββββββββ β βββββββββββββββββββββββββββββββββββββββββββββββββββ
Found a vulnerability? We take security reports seriously. Please email security@apployd.com and we'll respond within 24 hours.