New: Get started with InventoryOS in under 5 minutes. Start Free Trial →
Security First

Security at InventoryOS

Your inventory data is worth protecting. We build for that from day one, not as a late add-on.

Built by a cybersecurity professional, the platform is designed to protect device and software inventory end to end: strong transport and storage, least-privilege access, verifiable agents, and audit trails you can actually use in a review.

How we think about risk

Encrypt. Verify. Prove.

Three commitments you will see in the actual product, not only on a slide.

Encrypt by default

TLS on the wire, protected storage, and careful handling of secrets so inventory isn’t readable to whoever sits on the network path.

Verify the endpoint

Signed agents, scoped API keys, and tamper detection so the device reporting into your org matches the software you expect, not a swapped binary.

Leave an evidence trail

Audit logs and monitoring hooks that matter when someone asks “who changed what, and when?” They matter during incidents and compliance reviews alike.

Data lifecycle

Data Protection

Encryption in transit and at rest, plus a database layer built to avoid whole classes of attacks.

On the wire
TLS 1.2+
At rest
Encrypted storage
Queries
Parameterized
Stack
PostgreSQL
In transit

256-bit TLS

TLS 1.2+ with strong ciphers. Every API call, agent heartbeat, and browser session is encrypted on the wire.

At rest

Encrypted storage

Your inventory, software catalog, and compliance data stay protected at rest, not only in transit.

Queries

PostgreSQL + Prisma

Type-safe, parameterized access. Fewer injection footguns and stronger guarantees that data matches your schema.

Identity

Authentication & access control

Accounts are the front door. We combine MFA, short-lived sessions, and roles so the right people see the right inventory, without turning every login into a ticket.

Time-based one-time passwords for every account. They add a second factor beyond the password.
Owner, Admin, and Viewer roles enforce least privilege: who can change settings, enroll devices, or view inventory.
Tokens are validated and rotated so a stolen credential has a smaller window of abuse.
Configurable complexity and rotation rules so passwords match your org’s standards.
Repeated failed sign-ins trigger lockout to blunt brute-force and credential-stuffing.

Endpoints

Agent security

Installers you can verify, binaries that resist tampering, and API keys that can be rotated and scoped.

If you can’t trust what’s installed on the machine, you can’t trust the inventory. Signing, notarization, and key hygiene are how we keep the agent honest.

Design principle

Code-signed builds

Windows and macOS agents are signed so users can confirm software came from InventoryOS.

Apple notarization

macOS packages meet Gatekeeper checks before they ever run on a device.

Tamper resistance

Unexpected changes to the agent can be detected and acted on, so modified binaries don’t blend in.

API key rotation & scope

Rotate keys with grace periods for running integrations. Scope keys to orgs or actions so each automation gets minimum access.

Platform

Infrastructure

Managed hosting, sane patching, and edge protections. The table below has the specifics when you want them.

Edge & scale

TLS termination and DDoS protections from providers built for global traffic, so we focus on the app instead of building a CDN from scratch.

Shipping fixes

Dependencies and agents move on a steady cadence; critical issues don’t wait for the next quarterly window.

Abuse resistance

Rate limits and CSRF controls cut down automated noise and cross-site trickery.

Layer What you should know
Hosting API on Render, web on Vercel: DDoS mitigation, TLS termination, and scaling we don’t have to reinvent.
Patching Platform and agents get updates on a steady cadence; critical fixes jump the line.
CSRF State-changing requests are bound to real sessions so random sites can’t fire actions as your users.
Rate limits Auth and API routes are throttled to slow brute-force and noisy clients.
Security headers HSTS, CSP, X-Frame-Options, and similar headers for browser-side hardening against common web bugs.

Visibility

Monitoring & audit

See who did what, catch odd API behavior early, and ship failures to Sentry for fast triage. Evidence first, not guesswork.

Audit trail

Evidence you can stand behind

User actions, API calls, and system events are logged for compliance reviews and incident response, not just “trust us.”

Anomaly signals

Unusual API key patterns surface before they become a headline.

Privilege changes

Role and permission edits are tracked; escalation attempts get flagged.

Sentry

Exceptions land in Sentry with context so we fix root causes, including security-relevant failures first.

Application layer

Operational security

How we validate input, prove webhook authenticity, and keep browsers from leaking your API to random origins.

Validation

Zod at the boundary

Requests are checked against schemas before they touch business logic, together with parameterized queries and encoding to choke XSS and injection.

Integrations

Signed webhooks

Receivers verify payloads with shared secrets so traffic in transit can’t be silently rewritten.

Browser

Strict CORS

Only allow-listed origins can call the API from the browser. No drive-by reads of tenant data.

Roadmap

Compliance

We’re building toward the attestations enterprise teams expect, with clear intent and without hype. Audit logs, access controls, and encryption in place today are the same foundation auditors ask about tomorrow.

SOC 2 Type II

On our roadmap: controls, evidence, and processes designed for a future SOC 2 Type II audit. We do not currently claim SOC 2 compliance.

What you can already show an auditor

  • Encryption for data in transit and at rest
  • Authentication, MFA, and role-based access
  • Audit trails for security-relevant actions
  • Secure agent distribution and API key practices

See the controls in action

Ready to see it for yourself?

14-day free trial. No credit card required. Full Professional plan access.