Beta version, try convly for free

Security

Application Security:

  • No message content storage - Message bodies are never stored, only operational metadata (e.g., message ID, timestamps, status) is retained.
  • Log redaction enforcement - All message content is automatically redacted in application logs.
  • AES-256 message encryption - Inter-service messages are encrypted end-to-end using AES-256 with a randomly generated IV per message. The messaging infrastructure is deployed in private subnets and is not exposed to the public internet.
  • Webhook signature verification - All inbound Slack and Microsoft Teams events are verified using HMAC signature checks with replay attack protection via timestamp validation before any processing occurs.

Infrastructure Security (AWS / Terraform):

  • Encryption at rest - All data stores are encrypted using customer-managed keys with automatic rotation.
  • Secrets management - No credentials stored in code or environment files. All secrets (DB credentials, API keys, Slack tokens, ...) live in AWS Secrets Manager, KMS-encrypted.
  • IAM least privilege - Every service uses scoped IAM roles via OIDC (no long-lived credentials).
  • Database hardening - Database enforces SSL/TLS on all connections, deployed in private subnets only (no public internet access), deletion protection enabled.
  • Container security - ECR image scanning on every push. Container images are accessible only to authorized runtime environments.

Deployment, GitOps & Observability:

  • GitOps-enforced deployments with ArgoCD - All infrastructure and application changes go through Git. ArgoCD keeps production in sync with Git.
  • Hardened pod security - All containers run as non-root users.
  • Observability - All services emit traces and metrics with OpenTelemetry.