Security

A security tool should be secure.

We watch certificates for a living, so we take our own security seriously. Here's how we're building Tidelock — and how to reach us if you spot a problem.

Last updated: 25 April 2026

Architecture

Tidelock runs on managed cloud infrastructure with hardened images, no public SSH, and no shared admin credentials. Production access is restricted to a small group of engineers, gated by SSO and short-lived credentials. We use the principle of least privilege — every service gets only the access it strictly needs.

Encryption

All traffic to Tidelock is served over TLS 1.2+ with strong cipher suites. Data is encrypted at rest using industry-standard algorithms. Backups are encrypted with separate keys and stored in a different region from the primary database.

What we store

Public certificate metadata, your contact preferences, and your account details. We never store private keys, full certificate bodies beyond what's publicly accessible, or any data that isn't already exposed to the public internet. Full breakdown in the Privacy Policy.

Access controls

Internal access requires SSO with phishing-resistant MFA. Production database access is logged, audited, and approved per session. We rotate credentials on a schedule and immediately when any team member leaves.

Monitoring

We monitor our own infrastructure for unusual activity, failed logins, and anomalous traffic. Critical alerts page someone 24/7. We do what we ask our customers to do: keep eyes on the things that matter.

Dependencies

We track our software dependencies and patch known vulnerabilities promptly — critical issues within 24 hours, others on a regular cadence. Our build pipeline runs automated security checks on every commit.

Compliance

Tidelock is in private beta. Formal certifications (SOC 2, ISO 27001) are on the roadmap once we're past general availability. If you have a compliance requirement that's a blocker for adopting Tidelock, tell us — it helps us prioritize.

Reporting a vulnerability

If you've found a security issue, please email security@tidelock.dev. We aim to acknowledge within 24 hours and resolve high-severity issues within 7 days. Please:

  • Give us reasonable time to fix the issue before public disclosure
  • Don't access data that isn't yours, and don't degrade service for other users
  • Stick to non-destructive testing

In return, we won't pursue legal action against good-faith researchers, and we'll credit you (with your permission) once the fix ships.

General questions? hello@tidelock.dev. Security reports? security@tidelock.dev.