Security

Security is at the core of everything we do. VeraID is built from the ground up to protect your most sensitive credentials and identities.

SOC 2 Ready

Controls designed for SOC 2 compliance

GDPR Compliant

EU-hosted, EU data protection standards

ISO 27001 Aligned

Following security management framework

Credential Security

Credentials are protected with multiple layers of security using industry-leading cryptographic standards.

  • Argon2id Hashing: All credentials are hashed using Argon2id, the winner of the Password Hashing Competition. We use memory-hard parameters (64MB memory, 3 iterations) to make brute-force attacks computationally infeasible.
  • AES-256-GCM Encryption: Credentials are also encrypted using AES-256-GCM with unique initialization vectors. The authenticated encryption ensures both confidentiality and tamper detection.
  • Minimal Plaintext Exposure: Only a short prefix of each credential is stored in plaintext for identification purposes. The full credential is never stored unencrypted.
  • Encryption in Transit: All communications use TLS 1.3. We enforce HTTPS for all connections with HSTS enabled.

Key Management

  • Secure Key Storage: Encryption keys are stored in secure, isolated environments and never committed to code repositories.
  • Key Rotation: Encryption keys can be rotated without service interruption. Historical keys are retained for decryption of existing data.
  • Separation of Concerns: Authentication (via hashing) and retrieval (via encryption) use separate cryptographic operations, providing defense in depth.

Infrastructure Security

  • Cloud Security: We run on Cloudflare's global edge network with built-in DDoS protection, WAF, and automatic failover.
  • Network Isolation: All production systems are isolated in private networks with strict firewall rules and no public internet exposure.
  • Database Security: Databases are encrypted, access-controlled, and backed up with point-in-time recovery. No public endpoints.
  • Edge Computing: Our API runs on Cloudflare Workers, providing isolation at the request level and automatic geographic distribution.

Access Controls

  • Least Privilege: All internal access follows least privilege principles. Employees have only the access they need.
  • Multi-Factor Authentication: MFA is required for all employee accounts. We support hardware keys and authenticator apps.
  • Audit Logging: All access to production systems is logged and monitored. Logs are immutable and retained for compliance.
  • SSO Integration: Enterprise customers can use SAML/SCIM for centralized identity management and access control.

Incident Response

We maintain a comprehensive incident response program with 24/7 on-call coverage. Our incident response process includes:

  • Detection: Automated monitoring and alerting for security events, anomalies, and potential threats.
  • Response: Documented runbooks for common incident types. Escalation procedures and communication templates ready.
  • Communication: Affected customers are notified within 72 hours of confirmed breaches. Status updates provided throughout.
  • Post-Incident: Root cause analysis and lessons learned documented. Improvements implemented to prevent recurrence.

Report a Security Issue

Found a vulnerability? We appreciate responsible disclosure and offer a bug bounty program.

security@veraid.io