Built for paranoid engineers

Fairvisor is designed with a minimal trust surface. Your traffic data never touches our servers. Your edge runs on your infrastructure. Here's exactly how security works.

Data Protection

Aspect Detail
Data in transit TLS 1.2+ required, mTLS optional
Data at rest AES-256 encryption (SaaS database)
Policy bundles HMAC-SHA256 signed, tamper-detected at edge
EDGE_TOKEN Rotatable, scoped to single edge instance
JWT validation Configurable algorithms (RS256, ES256), JWKS auto-refresh
Secrets in policies Never stored in policy bundles — referenced, not embedded

Access Control

Role Permissions
Viewer Read policies, view analytics, view audit log
Editor Create/edit policies (draft only)
Operator Deploy policies, activate kill-switch, manage edges
Admin Manage users, roles, integrations
Billing Manage subscription, view invoices
Super Admin All permissions, manage SSO, approval workflows

Compliance

  • SOC 2 Type II — control mapping provided (CC6.1, CC6.3, CC7.2, CC7.3, CC7.4, CC8.1)
  • GDPR — edge processes data in your infrastructure, SaaS receives only aggregated metadata
  • Data residency — edge data stays in your infrastructure, SaaS region configurable (US/EU)
  • Audit log — immutable, exportable, indefinite retention (Enterprise)
  • MFA — supported at login for all SaaS accounts

Supply Chain & Build Integrity

  • SBOM — generated for every runtime and CLI image on release
  • Image signing — release images are signed with provenance attestations
  • Vulnerability gate — releases are blocked on HIGH or CRITICAL CVEs in container images
  • Nightly scan — automated vulnerability scan runs nightly against published images

Operational Security Readiness

Security controls must be operable under incident pressure, not just documented.

  • Runbooks: reject spike, SaaS disconnect, bad bundle rollback, budget exhaustion — Runbooks
  • Operations hub: consolidated incident handling and reliability controls — Operations Hub
  • SLO/alert baseline: pre-defined checks for no_bundle_loaded, reject spikes, descriptor mismatches, SaaS reachability — SLO and Alerting

Responsible Disclosure

If you find a security vulnerability, please report it to security@fairvisor.com. We commit to:

  • Acknowledge within 24 hours
  • Provide an initial assessment within 72 hours
  • No legal action against good-faith reporters
  • Credit in our security advisories (if desired)

Questions about our security model?

Talk to the team