Trust Center
Security practices
The engineering and operational controls that protect your data.
Last updated: 24 April 2026
Security at Open Doors is a product function, not a bolt-on. It covers the platform we build, the infrastructure we run on, the people who have access, and the processes that tie them together. This page is a plain-English summary; customers under NDA can request our SOC 2 report for the full detail.
Encryption
- In transit — TLS 1.2 or higher for every connection. HSTS preloaded on primary domains.
- At rest — AES-256 applied at the storage layer. Sensitive fields additionally encrypted at the application layer.
- Key management — keys stored in a managed key service, rotated regularly, never embedded in code.
Authentication and access control
- Strong password requirements and breach-password screening.
- Optional two-factor authentication (authenticator app or SMS); admins can enforce 2FA workspace-wide.
- SAML SSO for Enterprise plans (Okta, Azure AD, Google Workspace, generic SAML 2.0).
- Least-privilege permissions with granular per-module roles.
- Audit logs on every privileged action (available on Pro and Enterprise).
Application security
- Secure SDLC with threat-modelling on new features.
- Static and dynamic application security testing (SAST/DAST) in CI.
- Dependency scanning and patch windows for critical vulnerabilities.
- Annual third-party penetration test with remediation tracked to closure.
- Continuous bug-bounty programme (see Responsible Disclosure).
Infrastructure
- Hosted on major cloud providers with SOC 2, ISO 27001, and regional compliance certifications.
- Redundancy across availability zones.
- Automated backups with point-in-time recovery. Backups encrypted and tested via quarterly restores.
- Network segmentation and private subnets for databases and internal services.
- DDoS protection and Web Application Firewall at the edge.
Detection and response
- Centralised security logging with 365-day retention.
- Continuous monitoring and alerting on suspicious authentication, privilege escalation, and data-access patterns.
- Documented incident-response runbooks, tested annually.
- 24/7 on-call rotation for security and availability events.
Personnel and vendor risk
- Background checks for employees handling customer data, where legally permitted.
- Mandatory security and privacy training at onboarding and annually.
- All vendor access reviewed and justified; revoked on offboarding.
- Vendor-risk review before any sub-processor is added.
Resilience
Availability target 99.9% monthly. Business continuity and disaster-recovery plans tested annually. Current status and any incidents are published at /status.
Questions about this page? Contact privacy@opendoors.ai.
← Back to Privacy & Security