Security at Forgeon

Our approach to protecting your data and keeping the platform resilient.


Heads up: This page describes Forgeon’s security controls and processes. It is not legal advice and contains a few placeholders you should replace before launch.

Last updated: 2025-10-20

Security at Forgeon

Security isn’t a feature—it’s table stakes. Forgeon is designed as a multi-tenant, event-driven PaaS with layered controls across people, process, and technology. Below is a practical overview of how we protect your data and keep the platform reliable.


1) Security Philosophy

  • Least privilege by default. Access is granted narrowly and audited.
  • Secure by design. Simpler surfaces, strong defaults, paved roads.
  • Defense in depth. Multiple, overlapping controls—no single point of failure.
  • Transparency. Clear status comms, changelogs, and incident updates.
  • Continuous improvement. We ship, we measure, we harden.

2) Responsible Disclosure (Vulnerability Reporting)

If you believe you’ve found a security issue, please email security@forgeon.io (placeholder) with details and steps to reproduce. We’ll triage promptly and keep you updated.

  • Please avoid accessing other users’ data.
  • Don’t disrupt services or degrade availability.
  • We’re happy to acknowledge meaningful reports (hall of fame coming soon).

You can also check /.well-known/security.txt (optional) and our status page at /status (placeholder).


3) Data Protection & Privacy

  • Data roles. For your account and platform usage, Forgeon is a controller. For data processed through your apps hosted on Forgeon, we act as a processor/service provider. See our Privacy Policy for details.
  • Isolation. Tenant-scoped isolation at the service and data layers; internal identities and policies gate cross-tenant access.
  • Backups. Regular backups for core control-plane data; retention windows documented per service. See “Availability & Backups.”

4) Encryption

  • In transit. TLS for external traffic and mTLS/internal TLS where relevant between services.
  • At rest. Encrypted volumes or database-native encryption for core data stores; secrets are encrypted at rest.
  • Key handling. Keys are rotated per provider recommendations; avoid long-lived credentials where possible.

5) Network & Platform Security

  • Segmentation. Control plane and runtime/edge are separated across networks/hosts.
  • Ingress. API gateway with WAF/rate limiting, IP allow-listing (where configured), and request ID tracing.
  • Egress. Controlled outbound where appropriate; service roles with least privilege.
  • Runtime. Container isolation with restricted capabilities; host ports allocated only when needed; internal DNS for inter-service calls.

6) Application Security

  • Authn/Z. JWT (JWKS) verification at the gateway, audience/issuer checks, and role/permission mapping at services.
  • Input hardening. Validations at handlers; structured error handling; safe defaults.
  • Secrets. Centralized secret providers (Vault/env/manager), never commit to source. Rotations are supported.
  • Supply chain. Pinned images/builders; SBOM and image scanning on our roadmap.

7) Logging, Monitoring & Detection

  • Structured logs. Request IDs, tenant context (where applicable), trace propagation.
  • Metrics & alerts. Health checks, saturation/error budgets, anomaly alerts.
  • Audit trails. Sensitive actions and auth events are logged with timestamps and actor context.

8) Availability & Backups

  • SLO mindset. We design for steady availability and rapid recovery.
  • Backups. Periodic backups for core control-plane databases; integrity checks; restore drills planned.
  • Runtime resilience. Retry/backoff for events and job orchestration; idempotent handlers.

9) Incident Response

  • Playbooks. Defined severity levels, comms channels, and on-call escalation.
  • Contain → Eradicate → Recover. We scope and isolate the issue, patch, and restore services.
  • Communication. We’ll post updates on /status (placeholder) and, for material incidents, email impacted customers.

10) Customer Responsibilities

Security is shared:

  • Control access to your Forgeon org, API keys, and tokens.
  • Keep dependencies in your applications up to date.
  • Validate untrusted input, sanitize logs, and follow secure coding practices.
  • Configure CORS, auth, and environment variables in line with your app’s risk.

11) Compliance & Subprocessors

  • Subprocessors. We use carefully selected sub-processors to run the platform (compute, storage, analytics, email). See Subprocessors (placeholder) for the current list and purposes.
  • Data location. Services may be hosted in multiple regions/providers; we apply appropriate contractual and technical safeguards.
  • Compliance roadmap. Formal certifications (e.g., SOC 2) are on our path; we already implement many of the required controls.

12) Penetration Testing & Scanning

  • Periodic internal testing and dependency scanning.
  • Third-party penetration tests are planned; summaries may be made available under NDA.

13) Change Management

  • Peer-reviewed changes via PRs and CI checks.
  • Infrastructure as code with auditable diffs.
  • Staged rollouts and canaries where suitable.

14) Contact

  • Security reports: security@forgeon.io (placeholder)
  • General support: support@forgeon.io
  • Press/partnerships: hello@forgeon.io (placeholder)

Before launch: Replace placeholders (emails, /status, /legal/subprocessors), add your company legal entity and address, and align this page with your Terms and Privacy.