Security & Trust

Last Updated: May 1st, 2026 Document Version: 1.0 Document Classification: Public


At Apollo Deploy, security is not an add-on. It is foundational to how we design, build, and operate the platform.

Apollo Deploy exists to support high-impact release decisions. That responsibility demands a security posture built around confidentiality, integrity, availability, and controlled access.

This document describes Apollo Deploy's security practices, commitments, and limitations. It forms part of the contractual relationship between Apollo Deploy and its customers, alongside the Terms of Service, Privacy Policy, and Data Processing Agreement (DPA). In the event of conflict between this document and the Terms of Service, the Terms of Service shall prevail.


Definitions

For the purposes of this document:


Our Security Principles

Apollo Deploy is built on the following core principles:

Least Privilege by Default

Access to data and functionality is restricted to what is strictly necessary for the purpose being served. This is enforced through role-based access controls, scoped permissions, time-bound access grants, and regular access reviews. No Personnel shall retain access beyond what is required for their current role and responsibilities.

Defense in Depth

Security controls are layered across infrastructure, application, and operational processes to reduce blast radius and eliminate single points of failure. No single control is relied upon in isolation.

Zero Trust Architecture

All access requests are verified regardless of source location. Network location alone does not confer trust. Authentication and authorization are enforced at every layer.

Transparency Over Claims

We document what we do, avoid overstating guarantees, and prioritize verifiable controls over marketing language. Where controls are planned but not yet implemented, this is clearly stated.

Secure by Design

Security considerations are integrated from the earliest stages of system design and development, not applied retroactively.


Data Protection

Data Ownership

Customers retain full ownership and all intellectual property rights in their data at all times. Nothing in this document or in Apollo Deploy's Terms of Service shall be construed as transferring ownership of Customer Data to Apollo Deploy.

Apollo Deploy processes Customer Data solely to provide, maintain, and improve the platform, and solely in accordance with our Privacy Policy, Data Processing Agreement, and contractual obligations. Apollo Deploy shall not sell, license, sublicense, or otherwise commercially exploit Customer Data for any purpose unrelated to service delivery.

Upon termination of a Customer's account, Apollo Deploy shall delete or return Customer Data in accordance with the timelines and procedures specified in the Terms of Service and DPA. Customers may request data export at any time during the term of their agreement.


Data Classification

Apollo Deploy classifies data into the following categories to ensure appropriate handling:

ClassificationDescriptionExamples
ConfidentialCustomer Data requiring the highest level of protectionSource code references, deployment configurations, API keys, secrets
InternalOperational data not intended for public disclosureSystem logs, internal metrics, Personnel access records
PublicInformation explicitly made available to the publicPublished documentation, marketing materials

Controls are applied commensurate with data classification level.


Data Isolation


Encryption


Data Residency

Customer Data is stored and processed in the regions specified in the Customer's agreement or as selected during account configuration. Apollo Deploy shall not transfer Customer Data to a region outside the agreed-upon jurisdictions without prior written consent, except as required to provide the service and disclosed in the DPA.

Where data transfers occur across jurisdictional boundaries, Apollo Deploy ensures appropriate safeguards are in place consistent with applicable data protection law, including but not limited to:


Data Retention and Deletion


Access Control & Authentication

Role-Based Access Control

Authentication

Access Logging and Auditability

Credential Compromise

We design the platform assuming credentials may eventually be compromised. Controls to limit the impact of any single compromised account include:


Infrastructure Security

Apollo Deploy runs on modern cloud infrastructure designed for reliability, availability, and security.

Infrastructure Controls

Credential Management

Availability and Resilience


Application Security

Secure Development Lifecycle

Vulnerability Management


Logging & Monitoring


Integrations & Third-Party Access

Apollo Deploy integrates with external tools at the Customer's request and under the Customer's control.

Integration Controls

Subprocessors


Personnel Security


Operational Security


Incident Response

Apollo Deploy maintains a documented incident response plan designed to:

  1. Detect security incidents promptly through monitoring, alerting, and reporting channels
  2. Contain incidents to prevent further unauthorized access or data loss
  3. Eradicate the root cause and restore affected systems to a known-good state
  4. Recover normal operations with verified integrity
  5. Communicate with affected Customers in a timely and transparent manner
  6. Remediate by identifying lessons learned and implementing preventive measures

Notification Commitments

Limitations

While no system is immune to risk, Apollo Deploy prioritizes preparedness, rapid response, and transparency. The existence of this incident response process does not constitute a guarantee that Security Incidents will not occur.


Compliance & Security Assurance

Framework Alignment

Apollo Deploy's security controls are designed in alignment with industry-recognized frameworks and standards, including:

Important: Alignment with a framework does not constitute certification. Apollo Deploy does not currently hold SOC 2 or ISO 27001 certifications. We implement controls consistent with these frameworks and are actively planning toward formal certification in 2027. This document will be updated to reflect any certifications upon formal attainment.

Regulatory Compliance

Apollo Deploy is committed to compliance with data protection and privacy laws in all jurisdictions where it operates and where its Customers are located. Current compliance includes but is not limited to:

Regulation / FrameworkJurisdictionStatusNotes
GDPREU / EEAActiveDPA available upon request
UK GDPR / Data Protection Act 2018United KingdomActiveUK Addendum / IDTA available
CCPA / CPRACalifornia, USAActivePrivacy Policy details consumer rights
LGPDBrazilActiveAppropriate transfer mechanisms in place
PIPEDACanadaActivePrivacy practices aligned
Privacy Act 1988AustraliaActiveAPPs compliance maintained

Where Apollo Deploy operates in or serves Customers in jurisdictions not listed above, it will comply with applicable local data protection and privacy laws to the extent they apply to the services provided.

Independent Security Assessments

Enterprise Security Reviews

Apollo Deploy participates in enterprise security reviews, vendor risk assessments, and due diligence processes. Customers may request:

Certification Roadmap

Apollo Deploy maintains a roadmap toward formal certifications. Current planned milestones:

CertificationTarget TimelineStatus
SOC 2 Type II2027Planned — controls in active preparation
ISO 270012027Planned — controls in active preparation

These timelines represent current intentions and are subject to change based on business priorities and resource availability. They are not binding commitments. Customers will be notified when certifications are formally obtained, and this document will be updated accordingly.


Responsible Disclosure

We welcome and encourage responsible disclosure of security vulnerabilities.

Reporting

If you believe you have discovered a security vulnerability in the Apollo Deploy platform, please contact us at:

security@apollodeploy.com

Please include:

Our Commitments

Scope and Exclusions

The following are out of scope for responsible disclosure:


Limitation of Liability

The security practices described in this document represent Apollo Deploy's current commitments and are implemented using commercially reasonable measures. This document:

Apollo Deploy's aggregate liability for security-related claims is governed by the limitation of liability provisions in the applicable Terms of Service or enterprise agreement.


Changes to This Document

Apollo Deploy reserves the right to update this document to reflect changes in our security practices, compliance status, legal requirements, or regulatory developments in any applicable jurisdiction.


Contact

For security-related inquiries, reporting, or requests:

For urgent security matters, please include "URGENT" in the subject line.


Governing Law & Jurisdiction

General

This document and the security practices described herein are intended to apply globally and to comply with the laws and regulations of all jurisdictions in which Apollo Deploy operates or in which its Customers are located.

Dispute Resolution

Unless otherwise specified in an executed enterprise agreement or required by mandatory local law:

Preservation of Local Rights

Regulatory Cooperation

Apollo Deploy will cooperate with data protection authorities and regulators in any jurisdiction where such cooperation is required by applicable law, including responding to inquiries, participating in audits (where legally mandated), and providing information necessary for regulatory oversight.


This document is provided for informational and contractual purposes. It should be read in conjunction with Apollo Deploy's Terms of Service, Privacy Policy, and Data Processing Agreement. In the event of any conflict, the order of precedence shall be: (1) the executed enterprise agreement (if any), (2) the Terms of Service, (3) the Data Processing Agreement, (4) this Security & Trust document, (5) the Privacy Policy.