Overview
We know that source code is one of your most sensitive assets. Every component of Sourcegraph was designed with security in mind. We've detailed our strict security guidelines in this Trust Center. You can find details about our security program and request access to documents such as our SOC 2 report and pen test executive summary.
Compliance

Documents
Pentest Report
SOC 2
Data Processing Agreement
BC/DR
MSA Security Exhibit
Product Security
Audit Logging
Data Security
Integrations
See more
Data Security
Access Monitoring
Backups Enabled
Data Erasure
See more
App Security
Code Analysis
Credential Management
Responsible Disclosure
See more
Legal
Subprocessors




Cyber Insurance
Data Processing Agreement
See more
Access Control
Data Access
Logging
Password Security
Infrastructure
Anti-DDoS
BC/DR
Google Cloud Platform
See more
Endpoint Security
Disk Encryption
Mobile Device Management
Threat Detection
Network Security
Firewall
IDS/IPS
Security Information and Event Management
See more
Corporate Security
Asset Management Practices
Email Protection
Employee Training
See more
Policies
Acceptable Use Policy
Access Control Policy
Backup Policy
See more
Security Grades
HSTS Preload List
sourcegraph.com
ImmuniWeb
sourcegraph.com
Qualys SSL Labs
Sourcegraph.com
If you think you may have discovered a vulnerability, please send us a note.