Platform protections
- Infrastructure security and hosted runtime controls.
- App isolation, scoped access, and sandboxed execution.
- Credential handling, encryption, monitoring, and recovery practices.
AppDeploy is designed to isolate apps, scope data access, and protect user data with multiple controls working together: tenant boundaries, short-lived credentials, sandboxed execution, encryption, and operational safeguards.
Last updated: April 6, 2026
For a deeper walkthrough, read our security blog post .
This page summarizes the core platform controls and operating assumptions most often reviewed before production use.
AppDeploy secures the platform and hosting environment. You remain responsible for app-level authentication, authorization, user permissions, and deciding what data your app collects or stores.
These controls are designed to work together on every request rather than relying on one barrier.
Each app is kept in its own scope, so another AppDeploy app cannot read your app's files, database records, or internal messages through normal platform paths.
Tenant-scoped access uses temporary credentials generated for a specific app and operation, reducing reuse risk if a credential is exposed.
Backend code runs in a constrained sandbox with limited filesystem and runtime access, helping contain buggy or malicious code within its app boundary.
Separation is enforced at the infrastructure level as well as in application logic, so storage and shared data access remain tenant-scoped by policy.
Secrets, API keys, payment card data, government IDs, and other restricted data should not be placed in prompts or project files.
AppDeploy uses TLS in transit, encryption at rest where supported, least-privilege internal access, and operational monitoring and recovery practices.
Short answers to the security questions people typically ask before shipping production apps.
AppDeploy uses layered controls including tenant isolation, short-lived credentials, sandboxed execution, encryption in transit, encrypted storage where supported, and infrastructure-level policy enforcement.
For more detail, see How AppDeploy protects app and user data.
Do not submit secrets, payment card data, government IDs, or other restricted data in prompts, project files, or messages.
AppDeploy does not support HIPAA workloads and should not be used for PHI or ePHI unless agreed separately in writing under a BAA.
Build logs are retained for up to 30 days, security and access logs for up to 90 days, and backups for up to 30 days after deletion on a rolling basis for disaster recovery.
No. Deployment URLs are random and non-sequential, but anyone with the link can access the app unless the app adds authentication and authorization, which are built-in capabilities in the AppDeploy SDK.
AppDeploy combines tenant-scoped data paths with infrastructure-level policy enforcement. In practice, storage access, shared database access, and internal service paths are designed to stay within the current app's scope.
Operational access is intended to be limited to authorized personnel under least-privilege controls for support, security, and reliability purposes.
AppDeploy's platform controls are designed to keep tenant data scoped, but internal operational access is not the same thing as end-user access inside your app.
AppDeploy uses a short list of infrastructure and authentication providers to operate the platform.
These providers are limited to hosting/CDN and optional authentication services used to operate the platform.
For the authoritative and current list, see Subprocessors.
The security overview sits alongside the legal and operational documents that define how the platform is run.
How AppDeploy handles personal data, logs, retention, and data rights.
Data processing terms, responsibilities, and transfer safeguards.
The infrastructure and service providers used to operate the platform.
The longer narrative version of the platform security model and FAQ.
Questions about security or data handling? Review the Privacy Policy, DPA, or email security@appdeploy.ai.