Skip to content
mailmate

security

Trust is a list of specifics.

No marketing language. Just what we do, how we do it, and where to report issues.

Compliance posture

Compliance

FrameworkStatusNotes
SOC 2 Type IIIn auditExpected Q3 2026
GDPRCompliantDPA available for all operators
Data Processing AgreementIncludedSee /legal/dpa
EU Data ResidencyAvailableeu-west-1, eu-central-1

Architecture

Infrastructure & Data

ControlImplementation
Transit encryptionTLS 1.3 minimum on all connections
Data at restAES-256 encryption on all volumes
Tenant isolationInfrastructure-level, not application-level
Network segmentationVPC per region, private subnets for relay nodes
Secrets managementAWS Secrets Manager, no secrets in environment variables
Dependency scanningAutomated on every commit

Operational security

Operations

AreaPolicy
BackupsDaily snapshots, 30-day retention, cross-region copy
RecoveryRTO < 4h, RPO < 1h for relay tier
Incident responseWritten IR plan, tested annually
Status pagehttps://status.mailmatehq.com
Penetration testingAnnual third-party pentest
Access reviewsQuarterly review of all privileged access

Application security

Access Controls

FeatureDetails
SSOSAML 2.0 on enterprise plans
MFARequired for all operator accounts
RBACOwner / Admin / Viewer roles per tenant
Audit log90-day retention, immutable, exportable
API authenticationAPI keys with per-tenant scope
Session managementIdle timeout 1h, absolute timeout 24h

Vulnerability reporting

Report a Vulnerability

If you believe you have found a security vulnerability in mailmate, please report it to us privately before public disclosure.

  • Email: security@mailmatehq.com
  • PGP key available on request
  • We target acknowledgement within 1 business day
  • We ask for 90 days to remediate before public disclosure
  • We do not pursue legal action against good-faith reporters

Out of scope: social engineering, physical attacks, denial of service, and issues in third-party services we don't control.