Security

Security at SecureCodingHub

We build security training software. We take our own security seriously. Here is how we protect your data and our infrastructure.

SecureCodingHub is operated by LimePlate, Inc. As a company that teaches developers to write secure code, we hold ourselves to the highest security standards. Our platform is built with a security-first architecture, and our practices are continuously reviewed and improved.

Infrastructure Security

Encryption at rest

All data at rest is encrypted using AES-256 encryption. Database volumes, backups, and file storage are all encrypted with keys managed through a dedicated key management service.

Encryption in transit

All communications between clients and our servers use TLS 1.3. We enforce HTTPS across all endpoints with HSTS headers and certificate transparency monitoring.

Tenant isolation

Customer data is logically isolated at the application layer. Each organization's data is segregated with strict access controls, ensuring no cross-tenant data leakage.

Authentication & Access

SSO & SAML 2.0

Enterprise customers can integrate with their identity provider using SAML 2.0 single sign-on. We support all major IdPs including Azure AD, Okta, and OneLogin.

Multi-factor authentication

MFA support adds an additional layer of security to user accounts. We support TOTP-based authenticator apps for second-factor verification.

Session management

Sessions are cryptographically secured with short-lived tokens, automatic expiration, and revocation capabilities. Inactive sessions are terminated after a configurable timeout period.

Compliance

In Progress

SOC 2 Type II

We are actively pursuing SOC 2 Type II certification. Our controls for security, availability, and confidentiality are designed to meet the Trust Services Criteria.

Compliant

GDPR

We comply with the EU General Data Protection Regulation. We provide data processing agreements, support data subject rights, and maintain a lawful basis for processing.

Compliant

CCPA

We comply with the California Consumer Privacy Act. California residents can exercise their rights to know, delete, and opt-out of the sale of personal information.

Vulnerability Management

Regular penetration testing

We conduct regular third-party penetration tests of our infrastructure and application. Findings are triaged, prioritized, and remediated according to severity.

Dependency scanning

Our CI/CD pipeline includes automated dependency scanning and software composition analysis. Known vulnerabilities in third-party libraries are flagged and addressed promptly.

Responsible disclosure program

We maintain a responsible disclosure program for security researchers. If you discover a vulnerability, please report it to us and we will work with you to resolve it.

Data Handling

Minimal data collection

We collect only the data necessary to provide our services. We do not collect unnecessary personal information and we do not sell user data to third parties.

Retention policies

Data is retained only for as long as needed to fulfill the purposes for which it was collected. When data is no longer required, it is securely deleted or anonymized.

Right to deletion

Users can request deletion of their account and associated data at any time. We process deletion requests promptly and confirm completion within 30 days.

Responsible Disclosure

We value the work of security researchers who help keep our platform and users safe. If you believe you have found a security vulnerability in SecureCodingHub, we encourage you to report it responsibly.

Acknowledgment
Within 48 hours
Initial assessment
Within 5 business days

Guidelines

  • Provide a detailed description of the vulnerability and steps to reproduce
  • Allow reasonable time for us to investigate and fix the issue before public disclosure
  • Do not access, modify, or delete other users' data during your research
  • Do not perform denial-of-service testing or social engineering attacks

Operational security practices

Change management

Every change to production passes through a pull request review with at least one engineer outside the author's immediate working pair. CI runs unit, integration, and security checks on every push. Production deploys go through a separate approval step. Emergency changes follow a documented break-glass procedure with retrospective review the same week. Infrastructure changes are managed as code and reviewed under the same workflow as application code.

Dependency scanning cadence

Software composition analysis runs on every pull request and again on a nightly schedule against the main branch. Critical and high severity advisories trigger an alert to the on-call engineer with a target remediation window measured in days, not weeks. Medium and low advisories are batched into a weekly review. Container base images are rebuilt on a fixed cadence so transitive operating system patches reach production without requiring application changes.

Incident response playbook

The incident response plan defines four severity tiers, escalation paths, and a single point of accountability per incident. The first responder is responsible for containment and customer communication while a dedicated investigator works the technical trail. Post-incident reviews are blameless and produce a written record with action items tracked to closure. The plan is rehearsed at least twice a year against scripted scenarios so the muscle memory exists before a real incident.

What we ask of customers

Responsible disclosure

If your security team finds something during a contract pentest, an internal review, or routine use of the product, report it directly to our security team rather than discussing it publicly first. We will acknowledge within two business days, share a tracking identifier, and provide status updates until the issue is closed. We treat coordinated disclosure as a partnership.

Account-level least privilege

Customer administrators control role assignment within their tenant. The principle we encourage is the same one we apply internally: assign the narrowest role that lets a user do the work, and review the assignments on a regular cycle. Administrative access in particular should be limited to a small named group, and that group should be audited as people change roles inside your organization.

Off-boarding

When a person leaves your organization, deactivating them in your identity provider should propagate through SCIM to remove access from the platform. We strongly recommend SCIM-based provisioning over manual user management for any organization above thirty seats. If you cannot adopt SCIM today, an account-level off-boarding checklist with a named owner is the next best control.

What we publish and what we do not

Published

A status page covering platform availability and degraded-service incidents. A list of sub-processors. The current data processing addendum. This security page itself. Once SOC 2 Type II is complete, the report will be available under NDA on request through your account contact. Material policy updates that affect customers are announced through your account contact rather than buried in a changelog.

Not published

Internal network architecture diagrams, detailed authentication flows, the specific tooling our security team uses, key rotation schedules at the level of individual keys, and the names and roles of staff on the security team. Any of these can be reviewed under NDA when the conversation requires it — for example during a procurement-led security review — but they do not belong on a public page. Publishing them would lower the cost of a targeted attack without giving any customer a real benefit.

Security at SecureCodingHub: frequently asked

How our own posture maps to the policies and compliance questions customers most often raise during procurement.

Where does SecureCodingHub's application security policy live?

Our application security policy is enforced primarily through the engineering practices described on this page rather than as a separate marketing artifact. Every change to production passes through a pull request review and a CI pipeline that runs unit, integration, and security checks. Dependency scanning runs on every pull request and again nightly against the main branch. The application security policy your procurement team is most likely asking for sits inside the SOC 2 Type II package we are working toward and can be shared under NDA on request.

How does SecureCodingHub approach information security compliance?

Information security compliance is product-level here, not theatre. We are actively pursuing SOC 2 Type II with controls designed around the security, availability, and confidentiality Trust Services Criteria. We already operate in line with GDPR and CCPA, support data processing agreements, and honor data subject rights. The compliance posture you can verify today is documented on this page and in the data processing addendum; the SOC 2 report itself will be available under NDA through your account contact once the audit concludes.

Do you publish your full information security policy?

We publish what helps customers make informed decisions and we deliberately withhold what would lower the cost of a targeted attack. The information security policy material that is public includes this security page, the status page, the sub-processors list, and the current data processing addendum. Internal network architecture, detailed authentication flows, key rotation schedules, and security team staffing are reviewed under NDA during procurement-led security reviews rather than published on a public page.

What does SecureCodingHub's data security policy look like in practice?

Our data security policy is minimal-collection by default and least-privilege by design. Data at rest is encrypted with AES-256 using keys managed through a dedicated key management service, and data in transit uses TLS 1.3 with HSTS enforced. Customer data is logically isolated at the application layer so there is no cross-tenant leakage. We retain data only for as long as needed, support user-initiated deletion within 30 days, and never sell user data to third parties.

Questions about our security?

If you have questions about our security practices, need a copy of our security documentation, or want to discuss compliance requirements, reach out to our security team.

security@securecodinghub.com