Security
Most agencies' security pages are a list of acronyms. This is what we actually do (and what we ask you to do) during an engagement.
Your code, your infra, your IAM
From day one, code lands in your repository, infrastructure is provisioned in your cloud account, and identities are issued from your identity provider. We don't operate shared environments or proprietary platforms. When an engagement ends, you don't have to migrate anything off our systems. There's nothing on our systems to migrate.
Access controls
Engineers are added to your environments with the minimum permissions required for the scope of work. We document every access grant and request revocation when an engineer rolls off. Hardware on our side is encrypted, password-managed, and MDM-enforced. We require hardware-backed multi-factor authentication for any access to client systems.
Secrets and credentials
We never store production secrets locally. Credentials live in your secrets manager (1Password, AWS Secrets Manager, GCP Secret Manager, Doppler, whichever you use). We rotate any credentials issued during onboarding at engagement end.
Data handling
We don't copy production data to laptops. If we need realistic data for development, we either work in your staging environment or use a synthetic data generator we run in your account. We sign BAAs for healthcare engagements and DPAs for EU engagements.
AI and model use
When we work with foundation models for a client, prompts and completions are routed through your accounts (Anthropic, OpenAI, Google, etc.) so logging and retention policies are governed by your contracts with those providers. We do not train models on your data. We do not run side-channel prompts against your data.
Compliance posture
We help clients achieve SOC 2 Type II, ISO 27001, HIPAA, and GDPR compliance regularly, and we maintain internal practices aligned with SOC 2 controls. Our own external audit history can be shared under NDA during procurement.
Vulnerability disclosure
If you find a vulnerability in this site or in code we've shipped for a client we share, please email security@milebits.tech with details. We respond within one business day, never threaten legal action against good- faith researchers, and credit reporters on request.
Contact
security@milebits.tech for questionnaires, BAAs, DPAs, audit letters, and disclosure reports.