Welcome to Vullify’s Trust Portal. This portal provides a comprehensive overview of our approach to data privacy, cybersecurity, governance, and compliance.
Here, you can access documentation outlining Vullify’s application architecture, along with our compliance and security reports. You’ll also find a real-time list of our sub-processors.




More information ›

More information ›

More information ›
Vullify operates on Kubernetes hosted in Google Cloud (GCP), with our frontend running in Cloudflare Workers.
Our security-scanning infrastructure is powered by Google Cloud Kubernetes and Google Cloud virtual machines.
We persist data within Vullify using three external services:
PostgreSQL – Our primary application data is stored in Postgres:
Google Cloud Storage – For larger objects, such as uploaded files or downloadable resources, we use GCS object storage:
Google BigQuery – Vullify's data warehouse operates on BigQuery:
Vullify operates on Google Cloud Platform, which is responsible for low-level security controls such as physical data center security and network security.
Vullify operates a self-hosted Elastic stack that aggregates all application logs generated by our system, enabling us to correlate infrastructure events with application activity. Logs are retained for three months.
Users can authenticate to Vullify using several methods:
Vullify performs annual penetration testing and weekly vulnerability scans. In addition to scheduled scanning, we use the Vullify platform to run real-time vulnerability scans against our internet-facing systems when:
These scans help us quickly respond to changes in our attack surface and the evolving threat landscape, reducing the window of opportunity for potential attackers.
Critical and high-severity vulnerabilities must be remediated within 7 and 30 days respectively, medium-severity issues within 60 days, and low-severity findings on a best-effort basis.
We also scan for code dependency vulnerabilities and perform SAST analysis using multiple tools as part of our automated development pipeline. Any failures result in a pipeline failure, preventing code with identified issues from being merged into the main branch.
Access to production systems is controlled using GCP IAM, with two-factor authentication enabled for all accounts.
We follow the principle of least privilege by separating accounts into distinct administrator and user roles. Administrative access is granted only when necessary and is reviewed on a quarterly basis.
Vullify maintains a staging environment that is functionally identical to production but does not contain any production data. This environment is used to test code changes prior to release. In addition, we use GitLab review apps, where each feature branch automatically creates its own environment, allowing us to thoroughly test functionality before changes are merged into the main branch.
All changes to the Vullify codebase undergo peer review by at least two developers, followed by automated testing and deployment to staging for final validation before reaching production. Code cannot be merged or deployed to production unless it has passed all required tests and received approval from a senior engineer.
Our applications are deployed continuously, with releases occurring at least twice per week.
Our data protection policy is designed to keep your information secure and handled responsibly, in line with industry standards for data privacy and security.
Our data protection policy ensures your information is safeguarded responsibly and in accordance with industry standards for privacy and security.
We use advanced encryption techniques to safeguard confidential data from unauthorized access and cyber threats, continuously updating these measures to counter evolving risks.
Our team is highly trained in data privacy and protection, ensuring your information is handled by skilled and conscientious professionals.
We uphold transparency in our data protection practices and are ready to provide detailed information about our procedures upon request.
We routinely review and update our policies and practices to stay compliant with regulations and adapt to evolving data protection requirements.