Back to Home
Aerospace-Grade Security

Security at Sequence

Built from the ground up to meet the rigorous security requirements of the commercial space industry.

SOC 2 Type I

Certified

Our platform has achieved SOC 2 Type I certification, demonstrating that our security controls are properly designed to protect your data. This certification covers the Trust Services Criteria for Security, Availability, and Confidentiality.

FedRAMP

Planned 2026

We are actively working toward FedRAMP authorization to serve federal government customers and contractors. Our target authorization is planned for 2026, with infrastructure and controls being aligned to FedRAMP Moderate requirements.

Security Framework

Data Encryption

All data is encrypted both in transit and at rest using industry-standard cryptographic protocols.

  • • TLS 1.3 for all data in transit
  • • AES-256 encryption for data at rest
  • • Hardware Security Modules (HSMs) for key management
  • • Regular key rotation with automated processes

Access Control

Strict access controls ensure only authorized personnel can access systems and data.

  • • Role-based access control (RBAC) with least-privilege principles
  • • Multi-factor authentication (MFA) required for all access
  • • Single Sign-On (SSO) integration with enterprise identity providers
  • • Session management with automatic timeout and re-authentication

Infrastructure Security

Our infrastructure is designed for resilience, security, and compliance.

  • • Hosted on SOC 2 Type II certified cloud infrastructure
  • • Network segmentation and Web Application Firewall (WAF)
  • • DDoS protection and traffic monitoring
  • • Automated vulnerability scanning and patch management
  • • Geographic redundancy for business continuity

Audit & Monitoring

Comprehensive logging and monitoring for security and compliance verification.

  • • Immutable audit logs for all system access and data operations
  • • Real-time security monitoring and alerting
  • • Log retention aligned with regulatory requirements
  • • Regular audit log reviews and anomaly detection

Incident Response

Documented procedures ensure rapid and effective response to security incidents.

  • • 24/7 security incident monitoring
  • • Documented incident response procedures
  • • Customer notification within 72 hours of confirmed breach
  • • Post-incident analysis and remediation tracking
  • • Regular incident response drills and tabletop exercises

Operational Security

Personnel Security

  • • Background checks for all employees
  • • Security awareness training program
  • • Confidentiality agreements
  • • Access revocation upon termination

Vendor Management

  • • Security assessments for all vendors
  • • Contractual security requirements
  • • Regular vendor compliance reviews
  • • Minimized data sharing with vendors

Secure Development

  • • Secure SDLC practices
  • • Code reviews and static analysis
  • • Dependency vulnerability scanning
  • • Penetration testing program

Business Continuity

  • • Automated backups with encryption
  • • Disaster recovery procedures
  • • Recovery time objective (RTO) < 4 hours
  • • Annual DR testing and validation

Security Inquiries

For security-related questions, to request our SOC 2 Type I report, or to report a security vulnerability, please contact us.

Enterprise customers may request detailed security documentation under NDA.