Skip to main content

Encryption

Data in Transit

S2 endpoints are secured by TLS, and S2 uses TLS for service-to-service traffic internally as well.

Data at Rest

Data at rest is encrypted by the cloud systems S2 relies on.

Client-supplied Encryption Keys

Configure a basin with cipher and provide the encryption key for reads and writes at request time.

Client-side Encryption

Get end-to-end protection by encrypting and decrypting on the client-side.

Compliance

Email trust@s2.dev to request access to our SOC 2 report, for HIPAA BAA, or GDPR DPA.

Responsible Disclosure

Ethical hackers and security researchers can report vulnerabilities to us at security@s2.dev.