Updated on Mar 03, 2026

Security at Heist

Heist protects customer data and platform integrity through security practices consistent with industry standards. This page describes the technical and organisational measures Heist maintains, as referenced in the Data Processing Agreement (Annex III).

Heist may update these measures from time to time, provided that updates do not materially decrease overall security.

Access control

All access follows the principle of least privilege and is managed through identity and access management (IAM). Account credentials are personal and must not be shared.

Encryption

All data in transit is protected with TLS (v1.2 or higher). All data at rest is encrypted using AES-256.

Data separation

Customer data is logically separated using a workspace architecture. Each customer's data is isolated within their own workspace.

Availability

Services run in high availability with automated scaling and redundancy.

Backups and recovery

Data is backed up daily with 30-day retention. Recovery procedures are in place to restore service in the event of data loss.

Monitoring and logging

Systems are continuously monitored. Logs are retained for audit and forensic purposes.

Secrets management

Sensitive keys and credentials are stored securely using GCP Secret Manager.

Development security

All code changes are reviewed and undergo automated testing. Security bugs are prioritised over feature work.

Threat detection

Production systems are protected by a web application firewall (WAF), DDoS protection, and monitoring tools.

Incident response

Customers are notified without undue delay of major security incidents, in accordance with the Data Processing Agreement (Section 5).

Cloud infrastructure

Heist is hosted on Google Cloud Platform (GCP) and Supabase, both in the EU. Authentication is handled by Supabase using industry-standard security.

Physical security

Heist relies on Google Cloud Platform's physical security controls, which include biometric access, 24/7 monitoring, and environmental protections across all data centre facilities.

Compliance

Heist's security programme follows the principles of SOC 2 and ISO 27001. Formal certifications will be pursued as the company scales.

Customer data handling

Heist does not actively extract customer data from tested systems. The Service operates through test accounts created by the customer. Where cross-tenant testing is required, Heist uses multiple dedicated workspaces. For how Heist handles personal data incidentally encountered during testing, see DPA Section 1.5.2.

Your code base

Heist performs grey-box testing, emulating an attacker with access to the customer's platform but not the codebase. No codebase access is required.

For questions or legal concerns, reach us at legal[at]heisthq.com

Get ahead of your vulnerabilities. Run your pentests with Heist.

Get ahead of your vulnerabilities. Run your pentests with Heist.

Get ahead of your vulnerabilities. Run your pentests with Heist.