Join experts to dive deep into IaC security and governance on August 27

➡️ Register for IaCConf

Security

We prioritize security in everything we do - from our product architecture to the powerful governance and compliance features we offer.

Built-in features to help you build secure infrastructure and prove it.

  • Policies

    Spacelift policies provide a way to express rules as code to manage and secure your IaC environment and help make common decisions about login, access and execution.

    Read more

  • Automated Auditability

    Track every infrastructure change, who made it, when, and why, to stay compliant without slowing your team down. Spacelift creates an immutable audit trail that gives you total visibility and confidence during audits.

    Read more

  • Private workers

    To ensure the maximum level of flexibility and security, Spacelift supports end-to-end encryption using your private key.

    Read more

  • SAML 2.0

    Spacelift supports single sign-on using SAML 2.0 following single sign-on approach with centralized access to resources.

    Read more

  • Data encryption

    All of our data is encrypted at rest and in transit using best industry standards.

    Read more

  • Flexible Deployment Options

    Run Spacelift your way; in the cloud, self-hosted on your cloud provider, or fully on-prem (including air-gapped environments). You get complete control over how your data is stored, processed, and accessed.

Compliance

SOC2 Type II certification performed by an independent external auditor confirms the effectiveness of internal controls in terms of Spacelift security, availability, processing integrity, confidentiality, and privacy of customer data.

Spacelift is the first infrastructure-as-code (IaC) orchestration platform to receive FedRAMP authorization, delivering flexible, policy-driven automation to federal agencies and contractors seeking secure and compliant infrastructure workflows.

Responsible disclosure

If you discover a vulnerability, we would like to know about it so we can take steps to address it as quickly as possible. We ask you to help us better protect our clients and our systems.

Learn more