Trust & Security

Security

Your problem data is sensitive. Here's exactly how we protect it.

Encryption in transit

All API traffic is encrypted with TLS 1.3. We do not accept connections below TLS 1.2. Certificate pinning is available for enterprise on-premise deployments.

Encryption at rest

Job data, experiment logs, and account information are encrypted at rest with AES-256. Encryption keys are managed via AWS KMS with automatic annual rotation.

API key scoping

API keys can be scoped to specific operations (read-only, submit-only, admin). Business accounts support team-level key management with per-member granularity.

Network isolation

GPU compute nodes run in isolated VPCs with no public ingress. Job data is transmitted over private network interfaces between the API gateway and the compute layer.

Audit logging

All API calls, job submissions, and administrative actions are logged with timestamps, IP addresses, and key identifiers. Logs are immutable and retained for 12 months on Business plans.

Penetration testing

We commission third-party penetration tests annually. The most recent report (March 2026) is available to enterprise customers under NDA.

SOC 2 Type II

NEROX is in the process of completing SOC 2 Type II certification (expected Q3 2026). A current readiness report is available to enterprise customers upon request.

Dependency scanning

All dependencies are scanned for known vulnerabilities on every build. We use Dependabot and Snyk for automated alerting and patch management.

Responsible disclosure

If you discover a security vulnerability in the NEROX platform, API, or website, please report it privately before disclosing publicly. We commit to acknowledging your report within 24 hours, providing a timeline for remediation within 5 business days, and crediting you in our security acknowledgements if you wish.

We ask that you do not access or modify data belonging to other users, do not perform denial-of-service attacks, and give us reasonable time to address issues before public disclosure.

Report a vulnerability → support@driftrail.com