SECURITY POSTURE

SECURITY AT
TELESIS

We take the security of your monitoring data seriously. This page describes the technical and organizational measures we use to protect your data, your accounts, and our platform.

TLS 1.2+ everywhereServerless infrastructureHashed credentials

INFRASTRUCTURE SECURITY

Google Cloud Platform

All services run on Google Cloud Run, a fully managed serverless platform. No persistent VMs to patch or maintain.

Minimal container images

Container images are built with ko, a Go-native builder that produces distroless images with no OS layer, shell, or package manager — drastically reducing attack surface.

Serverless by default

Every service runs with min_instances=0 and scales to zero when idle. No long-lived infrastructure to compromise.

Encryption in transit

All traffic is encrypted with TLS 1.2 or higher. Internal service-to-service communication uses Google's encrypted network fabric.

No static IPs or exposed infrastructure

Services are fronted by Google's global load balancer with built-in DDoS protection. There are no static IPs, open ports, or directly addressable hosts.

Artifact Registry with cleanup policies

Container images are stored in Google Artifact Registry with automatic cleanup policies (7-day TTL, keep 5 latest) to limit exposure of old images.

DATA SECURITY

Encrypted database connections

PostgreSQL database connections require SSL. All data at rest is encrypted using AES-256 by the database provider.

Restrictive credential handling

Database credentials and secrets are stored with 0600 file permissions and managed through Google Cloud Secret Manager.

API keys hashed before storage

Project tokens and API keys are cryptographically hashed before being persisted. Raw keys are shown only once at creation time.

Configurable data retention

Check result data is retained based on your plan tier: 7 days (Free), 30 days (Starter), or 365 days (Pro). Data is automatically purged after the retention window.

No source code storage

Telesis monitors HTTP endpoints externally. We never access, store, or process your application source code or internal data.

AUTHENTICATION & AUTHORIZATION

Firebase Authentication

User authentication is handled by Firebase Authentication, supporting Google OAuth and email/password with secure session management.

Role-based access control

Four permission levels — Owner, Admin, Write, Read — let you control exactly who can view, modify, or manage your monitoring configuration.

Scoped project tokens

CI/CD integrations use project tokens that are scoped to specific organizations and can be revoked instantly.

Browser-based OAuth for CLI

The CLI authenticates via browser-based OAuth flow. No passwords are stored on disk or transmitted to our servers.

APPLICATION SECURITY

Input validation with protovalidate

All Connect-RPC API endpoints use protobuf schema validation (protovalidate) to reject malformed input before it reaches business logic.

Rate limiting

All API endpoints are rate-limited to prevent abuse and protect against denial-of-service attacks.

CORS and security headers

CORS is configured per environment. All responses include Content-Security-Policy, Strict-Transport-Security, X-Frame-Options, and X-Content-Type-Options headers.

Static analysis in CI

Every commit is scanned with gosec (Go security checker) and golangci-lint with security-focused linters. Code cannot merge without passing these checks.

Dependency scanning

Automated security scanning runs in CI to detect known vulnerabilities in both Go and JavaScript dependencies.

MONITORING & INCIDENT RESPONSE

Real-time error tracking

GCP Error Reporting captures and aggregates errors in real time, with automatic alerting for new error patterns.

Distributed tracing

OpenTelemetry tracing and metrics are instrumented across all services, providing full request lifecycle visibility.

Health check endpoints

Every service exposes liveness and readiness health check endpoints. Unhealthy instances are automatically replaced by the platform.

Audit logging

All administrative actions — service creation, check configuration changes, team member invitations, and alert rule modifications — are recorded in an immutable audit log.

COMPLIANCE & CERTIFICATIONS

SOC 2 Type II

We are actively working toward SOC 2 Type II certification to formally demonstrate our security controls and practices.

GDPR

We are committed to GDPR compliance. Data processing agreements are available on request, and region-specific data processing is on our roadmap.

Data deletion

You can request complete deletion of your account and all associated data at any time by contacting security@telesis.dev.

RESPONSIBLE DISCLOSURE

If you discover a security vulnerability in Telesis, we encourage responsible disclosure. Please report it to us so we can address it promptly.

Report via email

Send details to security@telesis.dev. Include steps to reproduce, impact assessment, and any relevant screenshots or logs.

Our commitment

We will acknowledge your report within 48 hours, provide an initial assessment within 5 business days, and keep you informed of our remediation progress. We will not take legal action against researchers who act in good faith.

Scope

Our disclosure policy covers the Telesis web application, API, CLI, and self-hosted agent. Third-party services (Firebase, Supabase, Google Cloud) should be reported to their respective security teams.

FREQUENTLY ASKED QUESTIONS

Where is my data stored?

All data is stored in a PostgreSQL database hosted by Supabase, with encrypted connections and AES-256 encryption at rest. Backend services run on Google Cloud Platform in the australia-southeast1 region.

How are API keys protected?

API keys and project tokens are cryptographically hashed using one-way hashing before being stored in the database. The raw key is displayed only once at creation time and cannot be retrieved afterward. Keys can be revoked instantly from the dashboard.

Can I delete my data?

Yes. You can delete individual services and checks from the dashboard, which removes all associated monitoring data. For complete account deletion, contact security@telesis.dev and we will purge all your data within 30 days.

What happens during a security incident?

We follow a structured incident response process: identify, contain, eradicate, recover, and review. Affected customers are notified within 72 hours of confirmed data breaches. Post-incident reports are published for transparency.

Do you access my application internally?

No. Telesis performs external synthetic monitoring only — HTTP/HTTPS requests to your public endpoints. We never access your internal network, source code, databases, or private infrastructure unless you explicitly deploy a self-hosted agent.

How do self-hosted agents connect?

Self-hosted agents initiate outbound connections to Telesis over TLS. They do not require inbound firewall rules or open ports. Agent-to-platform communication is authenticated and encrypted.

QUESTIONS ABOUT SECURITY?

Our team is happy to discuss our security practices in more detail or address specific compliance requirements.