Security at Sequence
Built from the ground up to meet the rigorous security requirements of the commercial space industry.
SOC 2 Type I
Certified
Our platform has achieved SOC 2 Type I certification, demonstrating that our security controls are properly designed to protect your data. This certification covers the Trust Services Criteria for Security, Availability, and Confidentiality.
FedRAMP
Planned 2026
We are actively working toward FedRAMP authorization to serve federal government customers and contractors. Our target authorization is planned for 2026, with infrastructure and controls being aligned to FedRAMP Moderate requirements.
Security Framework
Data Encryption
All data is encrypted both in transit and at rest using industry-standard cryptographic protocols.
- • TLS 1.3 for all data in transit
- • AES-256 encryption for data at rest
- • Hardware Security Modules (HSMs) for key management
- • Regular key rotation with automated processes
Access Control
Strict access controls ensure only authorized personnel can access systems and data.
- • Role-based access control (RBAC) with least-privilege principles
- • Multi-factor authentication (MFA) required for all access
- • Single Sign-On (SSO) integration with enterprise identity providers
- • Session management with automatic timeout and re-authentication
Infrastructure Security
Our infrastructure is designed for resilience, security, and compliance.
- • Hosted on SOC 2 Type II certified cloud infrastructure
- • Network segmentation and Web Application Firewall (WAF)
- • DDoS protection and traffic monitoring
- • Automated vulnerability scanning and patch management
- • Geographic redundancy for business continuity
Audit & Monitoring
Comprehensive logging and monitoring for security and compliance verification.
- • Immutable audit logs for all system access and data operations
- • Real-time security monitoring and alerting
- • Log retention aligned with regulatory requirements
- • Regular audit log reviews and anomaly detection
Incident Response
Documented procedures ensure rapid and effective response to security incidents.
- • 24/7 security incident monitoring
- • Documented incident response procedures
- • Customer notification within 72 hours of confirmed breach
- • Post-incident analysis and remediation tracking
- • Regular incident response drills and tabletop exercises
Operational Security
Personnel Security
- • Background checks for all employees
- • Security awareness training program
- • Confidentiality agreements
- • Access revocation upon termination
Vendor Management
- • Security assessments for all vendors
- • Contractual security requirements
- • Regular vendor compliance reviews
- • Minimized data sharing with vendors
Secure Development
- • Secure SDLC practices
- • Code reviews and static analysis
- • Dependency vulnerability scanning
- • Penetration testing program
Business Continuity
- • Automated backups with encryption
- • Disaster recovery procedures
- • Recovery time objective (RTO) < 4 hours
- • Annual DR testing and validation
Security Inquiries
For security-related questions, to request our SOC 2 Type I report, or to report a security vulnerability, please contact us.
Enterprise customers may request detailed security documentation under NDA.