Data security & privacy are in our DNA
We take security and privacy seriously here at Bearer. Our values reflect on our product, on who we work with, and on how we operate. That is by design, to protect your organization, and we are proud of it.

Controlled access
Bearer never clones repositories nor store source code ever. Bearer processes metadata only.

Encrypted data
Bearer does not store user authentication data. All data is encrypted when in transit and at rest.

Cloud-based
Bearer infrastructure runs on Amazon Web Services. We run inside a private network, with strict access.

Holistic security
All auth, data access, & infra providers are secure. All providers are SOC, ISO or PCI compliant.
Engineered to keep your data safe

Control data requests
Bearer integrates with your Source Code Management (SCM) software or your CI/CD pipeline (see the documentation for more details) and perform Static Code Analysis (SCA) on your code repositories to discover and classify data, and detect security risks.
In order to keep your sensitive data inside your private network and limit the files Bearer can access, and the actions that Bearer can perform, we use a Broker. The Bearer Broker acts as a proxy between Bearer and your code repositories.
The Broker maintains an approved data list for inbound and outbound data requests.
Only requests included in this approved list are allowed. By default, only metadata is sent to our infrastructure for processing and storing. You always have complete control over which data you are sending to Bearer.
