Security & Controls
Transparency and control are not optional features — they're the foundation of AstraOps.
Control Model
AstraOps proposes changes and executes only within your defined controls: approval gates, scoped credentials, and auditable actions. Every change is reviewed before execution.
- Every change requires explicit approval
- Scoped credentials with automatic rotation
- No bypass for any control gate
Data Handling
We process only infrastructure metadata (resource configurations, pipeline definitions). No secrets, credentials, or application data are stored.
- Infrastructure metadata only
- No secrets or credentials stored
- Data encrypted at rest and in transit
Auditability
Every action taken by AstraOps is logged with full context: who approved it, when it ran, what changed, and what the rollback path is.
- Full context for every action
- Who approved, when, what changed
- Complete rollback path documented
Access Model
Read-only by default. Write access is scoped to specific resources and requires explicit opt-in. Credentials are rotated automatically.
- Read-only by default
- Write access is scoped and opt-in
- Automatic credential rotation
Compliance & Certifications
Questions about our security model?
We're happy to walk through our controls and answer any questions.