Skip to main content

Overview

Our story began with a strong focus on security and compliance, making us the leading Platform as a Service (PaaS) for security and compliance. We provide developer-friendly infrastructure guardrails and solutions to help our customers navigate security audits and achieve compliance. This includes:

Learn more about security functionality

Authentication

Learn about password authentication, SCIM, SSH keys, and Single Sign-On (SSO)

Roles & Permissions

Learn to managr roles & permissions

Security & Compliance Dashboard

Learn to review, manage, and showcase your security & compliance controls

Security Scans

Learn about Aptible’s Docker Image security scans

DDoS Protection

Learn about Aptible’s DDoS Protection

Managed Host Intrusion Detection (HIDS)

Learn about Aptible’s methodoloy and process for intrusion detection

FAQ

Read the guide

How to achieve HIPAA compliance

Read the guide

How to navigate HITRUST Certification

Read the guide

How to navigate security questionnaires and audits

Aptible does not currently run antivirus on our platform; this is because the Aptible infrastructure does not run email clients or web browsers, which are by far the most common vector for virus infection. We do however run Host Intrusion Detection Software (HIDS 12) which scans for malware on container hosts. Additionally, our security program does mandate that we run antivirus on Aptible employee workstations and laptops.
Aptible is happy to provide you with copies of our audit reports and certifications, but we do require that the intended consumer of the reports have an NDA in place directly with Aptible. To this end, we use a product called Conveyor to deliver this confidential security documentation. You can utilize our Conveyor Room to e-sign our mutual NDA, and access the following documents directly at trust.aptible.com:
  • HITRUST Engagement Letter
  • HITRUST CSF Letter of Certification
  • HITRUST NIST CSF Assessment
  • HITRUST CSF Validated Assessment Report
  • SOC 2 Type 2 Report
  • SOC 2 Continued Operations Letter
  • Penetration Test Summary
Please request access to and view these audit reports and certifications here