Continuous investment in our security

The entire LinearB ecosystem is invested in continuous security improvements for our customers and platform. We understand the importance of security transparency and compliance at all levels that is required to sustain the confidence our customers have in LinearB.
Join the next wave of modern engineering organizations

Compliance

LinearB is proud to be externally verified as compliant to the following standards and can provide supporting evidence and information about the controls we have in place in specific relation to these standards. Both sets of controls undergo external review on an annual basis and copy of these report can be requested via your account team.

ISO/IEC 27001

Information Security Management System (ISMS)
It is the leading international standard focused on information security ISO-27001 is part of a set of standards developed to handle information security with over 100 audited safeguards to control risk.

SOC 2 Type II

AICPA
One of the more widely accepted certifications, the SOC2 Type II report is an attestation by a licensed CPA firm, focusing on both information security policies and the effective operation of security controls to safeguard customer data and mitigate risk.

Our Security Framework

LinearB uses third party security tools to continuously scan for vulnerabilities. We also regularly engage security firms to perform penetration tests and vulnerability assessments on our application and infrastructure. Reach out for more details.
LinearB uses third party security tools to continuously scan for vulnerabilities. We also regularly engage security firms to perform penetration tests and vulnerability assessments on our application and infrastructure. Reach out for more details.
LinearB uses third party security tools to continuously scan for vulnerabilities. We also regularly engage security firms to perform penetration tests and vulnerability assessments on our application and infrastructure. Reach out for more details.
LinearB uses third party security tools to continuously scan for vulnerabilities. We also regularly engage security firms to perform penetration tests and vulnerability assessments on our application and infrastructure. Reach out for more details.

Security Best Practices FAQ

Our security approach focuses on security governance, risk management and compliance. This includes encryption in transit and at rest, network security and server hardening, administrative access control, system monitoring, logging and alerting, and more.
LinearB uses Git metadata for its analysis. In order to clone your repositories and extract the necessary data for LinearB reports and in order to access real-time data using the Git provider’s API, LinearB needs permissions to the customer’s Git. All the operations that are done by LinearB are read-only actions. LinearB at no time stores or uses your code.
No, LinearB performs clone or shallow clone of repositories just for the purpose of extracting Git metadata. Once the metadata is processed, the repository is immediately deleted.
No, LinearB is using only the Git metadata that is available through the .git directory or data accessible via the Git provider API. No code is scanned, analyzed or saved.
hello world!