Security is the foundation

Not a feature, not an add-on. Every layer of Apployd is built with security as the default.

πŸ”

AES-256-GCM Encryption

Every secret is encrypted at rest with AES-256-GCM and a unique IV. Decryption happens only at container injection time.

πŸ›‘

Read-Only Containers

All application containers run with read-only root filesystems by default, preventing runtime tampering and persistence attacks.

πŸ‘₯

Role-Based Access Control

Granular RBAC with owner, admin, developer, and viewer roles. Scope permissions per project, per team.

πŸ“‹

Audit Logging

Every action β€” deploys, secret changes, team modifications β€” is logged with actor, timestamp, and IP for full traceability.

🌐

Network Isolation

Each project runs in its own Docker network. Inter-project communication is blocked by default with strict iptables rules.

πŸ“¦

Minimal Base Images

Build artifacts run on distroless or Alpine-based images with no shell, no package manager, minimal attack surface.

Defense in depth

Secret Injection

  • Secrets never written to disk or build layers
  • Injected as environment variables at container start
  • Per-environment secret scoping (dev / staging / prod)
  • Automatic secret rotation support

Build Security

  • Isolated build environments per project
  • No root access during builds
  • Build cache separated per project
  • Automatic vulnerability scanning of base images

Runtime Security

  • Read-only filesystems enforced
  • No privileged containers
  • Resource limits (CPU, memory) per container
  • Health-check-driven restarts

Infrastructure

  • TLS everywhere β€” API, dashboard, inter-service
  • SSH key-based server authentication
  • Automatic certificate provisioning via Let's Encrypt
  • Reverse proxy with rate limiting and DDoS mitigation

Compliance & certifications

SOC 2 Type IIIn Progress
GDPRActive
HIPAANot Supported
ISO 27001In Progress
Data ResidencyActive
Encryption at RestActive
Encryption in TransitActive
Audit TrailActive

Apployd is not currently HIPAA-compliant and does not provide a default Business Associate Agreement (BAA). Do not use the platform for PHI/HIPAA-regulated workloads unless a separate written agreement explicitly states support.

Security architecture overview

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                  HTTPS / TLS                     β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚
β”‚  β”‚ Dashboard│──▢│ API (mTLS)│──▢│  PostgreSQL   β”‚  β”‚
β”‚  β”‚  (Next)  β”‚   β”‚ (Fastify) β”‚   β”‚  (encrypted)  β”‚  β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚
β”‚                       β”‚                           β”‚
β”‚               β”Œβ”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”                   β”‚
β”‚               β”‚  Deploy Engine β”‚                   β”‚
β”‚               β”‚  (isolated)    β”‚                   β”‚
β”‚               β””β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”˜                   β”‚
β”‚                       β”‚                           β”‚
β”‚         β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”            β”‚
β”‚         β”‚   Docker Network (per-proj) β”‚            β”‚
β”‚         β”‚  β”Œβ”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β” β”‚            β”‚
β”‚         β”‚  β”‚ app  β”‚ β”‚ app  β”‚ β”‚ app β”‚ β”‚            β”‚
β”‚         β”‚  β”‚ (ro) β”‚ β”‚ (ro) β”‚ β”‚(ro) β”‚ β”‚            β”‚
β”‚         β”‚  β””β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”˜ β”‚            β”‚
β”‚         β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜            β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Responsible disclosure

Found a vulnerability? We take security reports seriously. Please email security@apployd.com and we'll respond within 24 hours.