Secure by design

We understand that code, documentation, and issue tracking are the core of your development workflow. That’s why we implement industry-standard security practices to protect your data at every stage.

Data Security
  • Secure Communication: All data exchanged between your devices, Stash services, and storage solutions is protected using robust TLS encryption.

  • Encrypted Storage: Data stored on AWS is secured using strong encryption methods with cloud-provider-managed keys.

  • Your Data, Your Control: Stash guarantees your data privacy, no customer data is sold or utilized to train shared AI models.

  • Team-Level Isolation: Access to data is controlled through strict internal policies, ensuring users from one company can only access their own company’s data.

  • Data Retention Policies: Data associated with deleted accounts or integrations is permanently and irreversibly removed from our systems.

Product Security
  • Secure Authentication: Stash employs strong built-in authentication measures, storing user passwords securely using advanced encryption that cannot be decrypted.

  • Private AI Models: All language models used by Stash are exclusively trained and owned by Stash, running securely in isolated environments that cannot be accessed publicly.

Operational Security
  • Proactive Testing: We continuously perform vulnerability assessments, penetration tests, and rigorous code reviews to proactively manage risks.

  • Incident Response: Stash maintains continuous monitoring and rapid response protocols to swiftly detect, assess, and remediate security incidents.