Skip to content

Secure Development Lifecycle (SDL)

  • Last Updated: 8 Mar 2026
  • Next Review: 1 Jul 2026

This page describes the security practices embedded across our software development lifecycle. These practices apply to all engineers working on Invisiq and are enforced through a combination of tooling, process gates, and training.

  • All engineers complete security awareness training on joining and annually thereafter.
  • Engineers working on sensitive subsystems (auth, cryptography, data handling) complete additional OWASP training.
  • Training completion is tracked and reported to leadership.

We conduct threat modelling for:

  • New features that introduce a significant attack surface (network-exposed endpoints, new authentication flows, data processing changes).
  • Changes to the deployment architecture.
  • Third-party integrations.

Threat models are documented and reviewed by at least one member of the security team before the feature ships.

We maintain internal secure coding guidelines that cover:

  • Input validation and output encoding
  • Authentication and session management
  • Authorisation and access control
  • Cryptography (approved algorithms, key lengths, and libraries)
  • Error handling and logging (avoiding sensitive data in logs)
  • Dependency usage (see Supply Chain Security)

Guidelines are reviewed annually and updated when new vulnerability classes emerge.

  • All code changes require at least 1 peer review(s) or Claude review before merging.
  • Security-relevant changes (auth, crypto, privilege escalation paths, external input handling) require review by a qualified security reviewer.
  • Our code review checklist includes security-specific checks.
  • Automated tooling (SAST, secret scanning, dependency audit) runs on every pull request and must pass before merge.
Tool typeTooling usedTrigger
SASTCodeQLEvery PR
Secret scanningGitHub Secret ScanningEvery commit
Dependency auditDependabotDaily + every PR
DASTOWASP ZAPPre-release
Container scanningTrivyEvery build

Critical findings block merge or release until resolved or formally accepted with a documented rationale.

Vulnerabilities identified through our own tooling or reviews are tracked in our internal issue tracker and security backlog with the following SLAs:

SeverityTriage SLARemediation SLA
Critical24 hours7 days
High3 business days30 days
Medium5 business days90 days
Low10 business daysNext release cycle

We operate a responsible disclosure programme. See our Vulnerability Disclosure Policy for how to report and what to expect.

  • Secrets (API keys, credentials, certificates) are never stored in source code or configuration files committed to version control.
  • Development secrets are managed via local development tooling (such as mise.local.toml and .env files excluded by .gitignore).
  • Production secrets are managed via appropriate cloud service provider secret and key management systems for any production workloads.
  • Secret rotation schedules are defined and enforced for all long-lived credentials.

Before a release is published:

  • All open critical and high vulnerabilities are resolved or formally accepted.
  • SAST, dependency audit, and container scan results are reviewed.
  • Penetration test findings (if a test cycle coincides) are addressed.
  • Changelog and security advisory (if applicable) are drafted.
  • Release artifacts are signed.

We commission external penetration tests of Invisiq annually, and additionally following significant architectural changes. Reports are available to customers under NDA on request.

Our internal incident response process covers vulnerabilities in Invisiq. In the event of a confirmed vulnerability affecting customers:

  1. We notify affected customers via email within 3 days of confirmation.
  2. We publish a CVE (where applicable) and a security advisory at CVE Database.
  3. We provide patched release artefacts and clear upgrade guidance.
Framework / standardStatusNotes
OWASP Top 10Addressed in coding standardsSee secure coding guidelines
NIST SSDFAligned
SOC 2 Type IIAligned but not certifiedEnprivacy plans to undertake this certification in due course
ISO 27001Aligned but not certifiedEnprivacy plans to undertake this certification in due course