Platform Security

How the DropOps platform protects your infrastructure and data.

Security by Intent

DropOps is designed around deliberate human action at every step, creating a chain of intent that makes unauthorized actions structurally impossible.

Every change requires your conscious choice. The AI freely explores to understand your systems, but modifying them always requires your explicit approval.

The Operator runs as a standard process on your system. Logging out of a remote session kills it. Rebooting the system kills it. You are always in control.

Complete Operator Control

You have multiple independent ways to cancel operations and stop operators:

No automatic timeouts—long-running operations like terraform apply complete naturally. You decide when to cancel. The operator is just a binary—run it however you prefer (foreground, background, screen/tmux, systemd). It leaves no services, daemons, or open ports when stopped.

Zero Inbound Connectivity

The DropOps Operator initiates all connections outbound. No open ports, no firewall rules, no VPN.

# Traditional approach
Internet --[SSH:22]--> Firewall --[VPN]--> Your Server
         Open ports = attack surface

# DropOps approach
Your Server --[outbound only]--> DropOps
            No listening ports. Nothing to attack.

Human-in-the-Loop Execution

All changes require your explicit approval. The AI proposes modifications, you decide.

No changes execute on your systems without your explicit approval. Read-only operations proceed automatically so you're only engaged when decisions matter.

Authentication

Data Protection

AI Safety Controls

We recommend running the Operator as a standard user. Only start with elevated privileges if your specific task requires it.

AI explaining sudo is blocked for security reasons

Infrastructure Security

Incident Response

We maintain a documented incident response plan with defined escalation procedures.

Severity Detection Customer Notification Resolution Target
P1 - Critical < 4 hours < 8 hours < 24 hours
P2 - High < 8 hours < 24 hours < 48 hours
P3 - Medium < 24 hours < 48 hours < 5 days
P4 - Low < 48 hours < 72 hours < 14 days

Business Continuity & Disaster Recovery

Metric Commitment
Service Availability 99.9% uptime SLA
Recovery Time Objective (RTO) < 4 hours
Recovery Point Objective (RPO) < 1 hour
Backup Frequency Continuous replication + hourly snapshots
Backup Retention 90 days
Geographic Redundancy Multi-region failover (US)
DR Testing Quarterly failover exercises

Third-Party Risk Management

We maintain a limited set of vetted subprocessors, each with documented security assessments.

Subprocessor Purpose Data Processed Compliance
Google Cloud Platform Infrastructure hosting All service data SOC 2, ISO 27001, FedRAMP
Stripe Payment processing Payment data only PCI DSS Level 1
Google (Gemini) AI processing Session context SOC 2, ISO 27001

Logging & Monitoring

Penetration Testing & Vulnerability Management

Network Security Details

Internal Access Controls

Data Classification & Handling

We collect only what is necessary to provide the service.

Data Type Collected Retention
Account information Email, name (from Google OAuth) Until account deletion
Chat history All conversations with the AI Until account deletion
Operator activity Commands, approvals, connection times Until account deletion
Audit logs All actions, approvals, and approver IP addresses 7 years
User preferences Workflow preferences (non-specific) Until account deletion

We never store passwords (Google OAuth only) or credit card numbers (Stripe handles all payment data). File contents are not persisted.

Operator Security Hardening

Both the Cloud Operator and standalone binary share the same ultra-high security foundation.

AWS Cloud Operator: Zero Standing Privileges

The Cloud Operator launches with zero access to your AWS resources. When you request something outside its current permissions, the AI asks for approval, grants itself least-privilege access, and executes—all in one step. Revoke any permission anytime.

🔒 Permission Boundary Protection: The IAM role includes a permission boundary that acts as a hard security ceiling. The Operator can never grant itself admin-level permissions like AdministratorAccess, iam:*, *:*, or policies with *Admin* in the name—even if the AI wanted to. It can only grant scoped, least-privilege permissions like ec2:DescribeInstances or s3:GetObject.

# DropOps Cloud Operator for AWS Permission Model
Permission Boundary (always enforced):
  DENY: AdministratorAccess, PowerUserAccess, *Admin*, *FullAccess
  DENY: Wildcard actions in inline policies
  (Hard security ceiling - cannot be bypassed)

Policy 1 - Base (always present):
  sts:GetCallerIdentity       (Who am I?)
  iam:GetRole, GetInstanceProfile (Self-discovery)
  iam:SimulatePrincipalPolicy (What can I do?)
  iam:ListRolePolicies, GetRolePolicy (List own policies)

Policy 2 - Self-Escalation (conditional):
  iam:PutRolePolicy, DeleteRolePolicy (Update own inline policies)
  iam:AttachRolePolicy, DetachRolePolicy (DropOps-* managed policies only)
  (Restricted by permission boundary above)

Intent-based escalation:
  AI: "Should I see other EC2 instances?"
  You: "Yes"
  AI: Generates and applies ec2:Describe* policy
  (Permission boundary allows - scoped permission)
Cloud Operator dynamic intent-based permissions flow

Auto-Approved Self-Discovery

Cloud Operators can check their own IAM identity and permissions without requiring your approval. These read-only commands (such as aws sts get-caller-identity and aws iam get-role-policy) help the AI understand what it can do before asking you for additional access.

The Operator can only access what you explicitly authorize through conversation. No pre-configured access to your AWS resources.

Slack Interface Security Coming Soon

Slack integration is coming soon. When available, Slack sessions will work exactly like web sessions—same authentication, same operator binding, same approval workflow.

The Slack interface will include the following security measures:

When launched, Slack will be an alternative interface, not a bypass. The same security controls that protect web sessions will protect Slack sessions.

Build & Release Pipeline

Our release process is designed for integrity and traceability:

Security Testing

We regularly perform internal security validations on Operator releases before distribution. Our testing includes:

We aim to run security validation on every build. Releases with critical failures are blocked pending review.

Compliance Alignment

DropOps is architected to meet enterprise compliance requirements. We implement the controls and practices required by major frameworks, positioning us for formal certification as we scale.

Framework Status Scope
SOC 2 Type II Aligned Security, availability, and confidentiality controls implemented
ISO 27001 Aligned (certification planned 2025) Information security management system in place
FedRAMP Aligned (certification planned) Federal security requirements for government customers
GDPR Aligned EU data protection requirements implemented
CCPA Aligned California consumer privacy requirements implemented
HIPAA Aligned (BAA available) Healthcare data protection controls in place

Note: "Aligned" means we have implemented the required controls and practices. Formal third-party certification is in progress. Documentation available upon request under NDA.

verified SOC 2 Aligned
lock TLS 1.3
military_tech Veteran-Owned (VOSB)
shield Zero Trust

Enterprise Security Review Pack

For security-conscious customers, consulting firms, or regulated industries, we offer a comprehensive security review package under NDA:

Request Security Review Pack

security@dropops.ai

Available to customers and qualified prospects. NDA required.

What We Don't Do

Transparency means being clear about boundaries. Here's what DropOps explicitly does not do:

Your Data Rights

Responsible Disclosure

Report Security Issues

security@dropops.ai

Include reproduction steps. We acknowledge within 48 hours and provide resolution timeline within 5 business days.

Related