Sentry
PrivacyTermsSecurity

Last updated · May 8, 2026

Security at Sentry

Security isn't a layer we add — it's the product. This page summarizes how we build, operate, and report on the security of Sentry by Dark Rock Labs.

Architecture

  • Multi-tenant isolation — every data row carries a tenantId and is protected by Postgres Row-Level Security policies, not just application checks.
  • Encryption in transit — TLS 1.3 on every public endpoint; HSTS preload-eligible.
  • Encryption at rest — AES-256 (Supabase / Vercel managed storage).
  • Secret management — secrets live only in Vercel environment variables; nothing in the repo, nothing in logs.
  • Least-privilege auth — Supabase Auth + Postgres roles; service-role keys never reach the browser.

Application security

  • Server actions enforce session checks and tenant scoping on every request.
  • Strict security headers: CSP, X-Frame-Options DENY, X-Content-Type-Options nosniff, Permissions-Policy, Referrer-Policy strict-origin-when-cross-origin.
  • HTML sanitization (sanitize-html) on every untrusted HTML render.
  • Dependency scanning via GitHub Dependabot; high-severity advisories fixed within 7 days.

Sub-processors

  • Vercel Inc. — application hosting and edge delivery.
  • Supabase Inc. — Postgres database, authentication, object storage.
  • Resend Inc. — transactional email.

We notify administrators of material sub-processor changes at least 30 days in advance.

Operational practices

  • Backups — automated daily snapshots with point-in-time recovery to 7 days.
  • Logging — request logs retained 30 days; security audit logs retained 12 months.
  • Incident response — 24-hour notification target for confirmed security incidents affecting Customer Data.
  • Change management — every production change ships through a PR with code review and automated checks.

Compliance roadmap

  • SOC 2 Type II — observation period in progress (target completion Q4 2026).
  • ISO 27001 — controls mapped; certification audit scheduled Q1 2027.
  • HIPAA — BAA available for Enterprise customers handling PHI.
  • GDPR / UK GDPR / CCPA — DPA available at contract signing.

Reporting vulnerabilities

We welcome reports from the security community. Email security@darkrocksecurity.com or use our PGP key (fingerprint available on request). We commit to acknowledging reports within 2 business days and providing a status update within 7 days. We do not pursue good-faith researchers who follow responsible disclosure.

Trust portal

Customers and prospects under NDA may request SOC 2 reports, penetration-test summaries, and our latest sub-processor list at trust@darkrocksecurity.com.

© 2026 Dark Rock Labs, Inc.Back to Sentry