Security

Built for regulated workflows

Stellarbridge is designed to protect the confidentiality, integrity, and availability of customer data through layered technical, organizational, and operational safeguards.

SOC 2-aligned controlsHIPAA-minded operationsPen tests annuallyQuarterly access reviews

Last updated: January 15, 2026

Shared responsibility

Security works best as a partnership. Stellarbridge secures the platform and operational processes, while Customers are responsible for how they configure access, classify data, and manage users inside their own organization.

Security at a glance

Platform architecture highlights

Network edge “choke point”

Public traffic is routed through an edge proxy that applies security controls before requests reach application services.

  • Geo-blocking (US/CA allowlist) and Tor exit node blocking
  • Security headers applied to responses
  • Structured request logging to support investigations

Reduced runtime attack surface

The application stack is designed to reduce unnecessary runtime components.

  • Minimal container images where possible
  • No interactive shell in runtime containers
  • Read-only filesystem and non-root execution intended for production deployments

Compliance & documentation

We maintain security policies, procedures, and a control mapping aligned to common frameworks (including SOC 2 and HIPAA). Security documentation and supporting evidence are available to Enterprise customers under NDA through our trust portal.

Security contact

To report a vulnerability or ask a security question, contact security@stellarbridge.com.