Legal & Trust

Security Policy

This page explains the core security principles, control surfaces, and responsibility boundaries Octopus Group uses across the corporate site, developer entry points, preview environments, and platform delivery.

Last updated: April 6, 2026
Baseline

Contracts, tests, gates, auditability, and layered boundary controls

Applies to

Corporate site, developer entry points, preview environments, and integration delivery workflows

Security contact

[email protected]

1. Security principles

Our goal is not to stack isolated controls only at the perimeter, but to enforce constraints across protocol, execution, governance, and audit layers together. For public properties and developer entry points, we emphasize minimal exposure, boundary isolation, request auditability, and runtime observability.

Across platform and workflow capability, we use contracts, tests, gates, replay, and layered control surfaces to reduce the risk of mis-execution, overreach, and non-explainable system behavior.

2. Site and entry-point controls

The corporate site, contact entry points, and public developer surfaces are protected through domain isolation, reverse-proxy controls, logging, publishing boundaries, and access policies that reduce abuse exposure. Public preview and test entry points are not treated as default production commitments.

External traffic passes through edge networking, domain proxying, service routing, and local service boundaries. Relevant logs are used for troubleshooting, auditability, and security investigation.

3. Platform and integration security

When customers, partners, or developers integrate with the platform, we emphasize capability boundaries, permission scope, request traceability, and replayability. Public preview environments should use test or non-sensitive data only, while production-grade integrations require separate delivery and control processes.

Different use cases bring different security requirements. ERP, MSP, NOC, Search & Docs, and Contact Center scenarios involve different data paths, permission chains, and audit expectations, so rollout is not handled through a one-size-fits-all template.

4. Incident response and disclosure

If we identify a security event affecting the site, developer entry points, or related services, we handle it according to severity, including isolation, audit review, access restriction, configuration remediation, and follow-up notification where appropriate.

If you discover a potential security issue, contact us through the security email listed on this page. Do not perform destructive testing, data extraction, or disruptive scanning without authorization.

5. Shared responsibility and limitations

We are responsible for the baseline security of the site, public entry points, delivery boundaries, and platform control surfaces. Customers and integration partners remain responsible for their own accounts, credentials, configuration, test data, and business-specific compliance obligations.

No internet-facing service can honestly be described as risk-free. Our goal is to make risk visible, constrained, auditable, and quickly actionable when response is required.

OctopusOS
How can we help?