CODINAMO
Home Features Pricing Login

Security at Codinamo

Your security is our top priority. Learn how we protect your code, data, and deployments.

Security First: We employ industry-leading security practices to ensure your pipelines, code, and credentials are protected at every step of the deployment process.

1. Infrastructure Security

Codinamo is built on secure, enterprise-grade infrastructure designed to protect your data and workloads:

🔒

Encrypted at Rest

All data stored in our databases and file systems is encrypted using AES-256 encryption.

🔐

Encrypted in Transit

All communications use TLS 1.3 to protect data as it moves between your browser and our servers.

🛡️

Container Isolation

Each pipeline execution runs in an isolated environment with strict access limits and security policies.

🌐

Network Security

Private VPCs, security groups, and firewall rules ensure network-level protection for all resources.

2. Application Security

2.1 Authentication & Authorization

  • Multi-factor Authentication (MFA): Optional 2FA via TOTP authenticator apps
  • JWT Tokens: Secure, short-lived tokens for API authentication
  • Role-Based Access Control (RBAC): Granular permissions for team members
  • Session Management: Automatic session expiration and secure cookie handling

2.2 Code Security

  • Secrets Management: Credentials are encrypted at rest and never exposed in logs or pipeline outputs
  • Environment Isolation: Separate environments for development, staging, and production
  • Code Scanning: Automated security scanning for vulnerabilities (Enterprise plan)
  • Dependency Checks: Monitor and alert on vulnerable dependencies in your projects

2.3 Pipeline Security

  • Sandboxed Execution: Pipelines run in special isolated virtual amchine with restricted privileges
  • Resource Limits: CPU, memory, and execution time limits prevent resource abuse
  • Audit Logging: Complete audit trail of all pipeline executions and modifications
  • Secure Artifact Storage: Build artifacts are encrypted and access-controlled

3. Compliance & Certifications

Codinamo is committed to meeting industry security standards and regulatory requirements:

GDPR Compliant LGPD Compliant SOC 2 Type II (In Progress) ISO 27001 (Planned)

3.1 Data Privacy

  • GDPR & LGPD: Full compliance with European and Brazilian data protection regulations
  • Data Residency: Choose where your data is stored (US, EU, or Brazil)
  • Right to Deletion: Delete your data at any time through account settings
  • Data Portability: Export all your data in standard formats

3.2 Third-Party Security

  • Vendor Assessment: All third-party services undergo security review
  • Minimal Data Sharing: We share only necessary data with third parties
  • Contractual Safeguards: Data processing agreements with all vendors

4. Operational Security

4.1 Monitoring & Incident Response

  • 24/7 Monitoring: Real-time security monitoring and alerting
  • Intrusion Detection: Automated detection of suspicious activities
  • Incident Response Plan: Documented procedures for security incidents
  • Security Team: Dedicated security engineers on-call

4.2 Vulnerability Management

  • Regular Scanning: Automated vulnerability scanning of all infrastructure
  • Penetration Testing: Annual third-party security audits
  • Bug Bounty Program: Rewarding security researchers for responsible disclosure
  • Patch Management: Rapid deployment of security updates

4.3 Backup & Disaster Recovery

  • Automated Backups: Daily encrypted backups of all data
  • Multi-Region Replication: Data replicated across multiple geographic regions
  • Disaster Recovery Plan: Tested recovery procedures with RTO < 4 hours
  • Business Continuity: 99.9% uptime SLA (Enterprise plan)

5. Developer Security Best Practices

We follow secure development practices throughout our engineering process:

  • Secure SDLC: Security integrated into every phase of development
  • Code Reviews: All code changes reviewed by senior engineers
  • Static Analysis: Automated security scanning in CI/CD pipelines
  • Dependency Management: Regular updates and vulnerability scanning
  • Least Privilege: Minimal permissions for all services and users
  • Security Training: Regular security awareness training for all engineers

6. Your Responsibilities

Security is a shared responsibility. Here's how you can help keep your account secure:

  • Strong Passwords: Use unique, complex passwords for your account
  • Enable 2FA: Add an extra layer of security to your account
  • Protect Credentials: Never commit secrets or passwords to your repositories
  • Review Access: Regularly audit team member permissions
  • Monitor Activity: Review audit logs for suspicious activities
  • Report Issues: Contact us immediately if you suspect a security issue

7. Transparency & Communication

We believe in transparent security practices and clear communication:

  • Security Updates: Regular updates on our security posture and improvements
  • Incident Disclosure: Prompt notification of any security incidents affecting your data
  • Status Page: Real-time system status and incident reports at status.codinamo.com
  • Security Advisories: Public disclosure of resolved vulnerabilities

🔐 Report a Security Vulnerability

Found a security issue? We appreciate responsible disclosure and will work with you to resolve it quickly.

Email: security@codinamo.com

We respond to security reports within 24 hours and provide regular updates throughout the resolution process.

Questions about security? Our security team is here to help. Contact us at security@codinamo.com or reach out to your account manager for enterprise security inquiries.

CODINAMO

Your way to production

Build, manage and deliver deployment pipelines with ease.

Product

  • Features
  • How it works
  • Integrations
  • Pricing

Company

  • Security
  • Status

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy

© 2025 Codinamo. All rights reserved.

Privacy • Terms • Security