Back to Home

Synap Legal

Security Policy

Last updated: January 20, 2026

1. Infrastructure Security

Synap orchestrates infrastructure across top-tier cloud providers (Hetzner, OVH). We do not own the physical servers but ensure that our providers meet stringent security standards (ISO 27001).

Each Data Pod is an isolated Virtual Private Server (VPS) or dedicated instance. There is no mixing of data or runtime environments between users.

2. Data Pod Hardening

When we provision a server, we apply a strict hardening profile:

SSH Hardening: Root password login is disabled. Key-based authentication is enforced.

Firewall (UFW): Only essential ports (SSH, HTTP/HTTPS) are exposed. Internal governance ports are restricted to our Control Plane IP range.

Automatic Updates: Security patches are applied automatically via unattended-upgrades.

3. Data Privacy & Encryption

All data in transit between you and your Data Pod is encrypted via TLS (SSL). We manage the issuance and renewal of Let's Encrypt certificates for your custom domains automatically.

Data at rest encryption depends on the specific storage configuration of the underlying provider and your specific needs.

4. Access Control

You are the admin of your Data Pod. Synap retains an administrative SSH key solely for the purpose of automated management (upgrades, backups, health checks) and support intervention if requested.

5. Reporting Vulnerabilities

We take security seriously. If you discover a vulnerability in our Control Plane or Default Pod Configuration, please report it immediately to security@synap.live. We will acknowledge your report within 24 hours.

© 2026 Synap Technologies. All rights reserved.