Documentation Index
Fetch the complete documentation index at: https://s2.dev/docs/llms.txt
Use this file to discover all available pages before exploring further.
Encryption
Data in Transit
S2 endpoints are secured by TLS, and S2 uses TLS for service-to-service traffic internally as well.
Data at Rest
Data at rest is encrypted by the cloud systems S2 relies on.
Client-supplied Encryption Keys
Configure a basin with cipher and provide the encryption key for reads and writes at request time.
Client-side Encryption
Get end-to-end protection by encrypting and decrypting on the client-side.
Compliance
Email trust@s2.dev to request access to our SOC 2 report, for HIPAA BAA, or GDPR DPA.Responsible Disclosure
Ethical hackers and security researchers can report vulnerabilities to us at security@s2.dev.See also
Cells
Tenancy options
Private networking
Avoiding the internet

