...
Please see our Privacy Policy concerning how we manage your data.
How we develop secure software
- We use code reviews to detect vulnerabilities before merging and delivering to customers,
- We ensure that we check for permissions for any resources we have, and we regularly review those permissions,
- We use Git to manage changes, so that any code that goes to production is easily auditable.
How we keep our communications secure
...
- We use SSH keys to access our servers,
- We use HTTPS and SSL certificates to communicate between us and with you.
- We don't transfer data in clear-text over the network, except in situations where we display a warning such as support requests through emails.
How we keep the data secure
...
Please see the Privacy Policy on where we store data.
How we develop secure software
...
data
...
.
How we ensure continued security
...
If you notice a vulnerability, please contact us at security@play-sql.com. Should you notice a vulnerability that affects security, please request us to use GPG (documentation from DO or Linode).