Security & Privacy Overview

Overview

Defense Catalyst is built with security and privacy as core principles. This document explains how we protect your data, what security features are available, and best practices for secure automation.

Note: This is a public-friendly overview. For detailed security documentation, compliance certifications, and technical security details, contact our security team.


Data Handling

Where Your Data Lives

Infrastructure:

Data Types:

Data Flow

Your Browser
    ↓ HTTPS (TLS 1.3)
Defense Catalyst Frontend
    ↓ HTTPS (TLS 1.3)
Defense Catalyst Backend
    ↓ Encrypted Connection
External Services (via your connections)

Key Points:

Data Encryption

In Transit:

At Rest:

Key Management:


Secrets & Credentials

How Connections Are Stored

OAuth Tokens:

API Keys:

Passwords:

Who Can Access Connections

Workspace Admins:

Workspace Editors:

Workspace Viewers:

Credential Rotation

Best Practices:

How to Rotate:

  1. Generate new credentials in external service
  2. Update connection in Defense Catalyst
  3. Test connection
  4. Revoke old credentials
  5. Monitor for issues

Access Controls

User Roles

Admin

Can:

Cannot:

Editor

Can:

Cannot:

Viewer

Can:

Cannot:

Inviting Team Members

Process:

  1. Admin sends invitation
  2. User receives email
  3. User creates account or signs in
  4. User joins workspace with assigned role

Security:

Removing Access

When User Leaves:

  1. Admin removes user from workspace
  2. User loses access immediately
  3. User’s flows remain (can be reassigned)
  4. User’s connections remain (can be deleted)
  5. Audit log entry created

Best Practices:


Compliance

Defense-Focused Features

DoD Compliance:

Security Features:

Air-Gapped Deployment

What It Means:

Available For:

Contact: Enterprise sales for air-gapped deployment options

Audit Logging

What’s Logged:

Retention:

Access:


Authentication

Password Requirements

Minimum Requirements:

Best Practices:

Multi-Factor Authentication (MFA)

Supported Methods:

Setup:

  1. Go to Account Settings
  2. Enable MFA
  3. Scan QR code with authenticator app
  4. Enter verification code
  5. Save backup codes

Recovery:

Single Sign-On (SSO)

Available For: Enterprise customers

Supported Providers:

Benefits:


Network Security

IP Whitelisting

Available For: Enterprise customers

What It Does:

Use Cases:

Firewall Rules

Inbound:

Outbound:

TLS/SSL

Configuration:


Data Privacy

What We Collect

Account Data:

Flow Data:

Connection Data:

What We Don’t Collect

Data Sharing

We Never:

We May Share:

Your Rights

You Can:

How to Exercise Rights:


Best Practices

For Workspace Admins

User Management:

Connection Management:

Monitoring:

For All Users

Account Security:

Flow Security:

Data Handling:

For Developers

API Security:

Integration Security:


Incident Response

If You Suspect a Security Issue

Immediate Actions:

  1. Change your password
  2. Revoke suspicious connections
  3. Review recent activity
  4. Contact security team

Report To:

If Your Account Is Compromised

Steps:

  1. Reset password immediately
  2. Enable MFA if not already enabled
  3. Review and revoke all connections
  4. Check audit logs for unauthorized activity
  5. Contact support
  6. Rotate all external credentials

Our Response

We Will:

Timeline:


Compliance & Certifications

Current Certifications

Compliance Documentation

Available:

Request: Contact compliance@defensecatalyst.com



Security Contact

For Security Issues:

For Privacy Questions:

For Compliance:


Quick Reference

Security Checklist

Account:

Workspace:

Connections:

Flows: