Skip to main content

Documentation Index

Fetch the complete documentation index at: https://s2.dev/docs/llms.txt

Use this file to discover all available pages before exploring further.

Encryption

Data in Transit

S2 endpoints are secured by TLS, and S2 uses TLS for service-to-service traffic internally as well.

Data at Rest

Data at rest is encrypted by the cloud systems S2 relies on.

Client-supplied Encryption Keys

Configure a basin with cipher and provide the encryption key for reads and writes at request time.

Client-side Encryption

Get end-to-end protection by encrypting and decrypting on the client-side.

Compliance

Email trust@s2.dev to request access to our SOC 2 report, for HIPAA BAA, or GDPR DPA.

Responsible Disclosure

Ethical hackers and security researchers can report vulnerabilities to us at security@s2.dev.

See also

Cells

Tenancy options

Private networking

Avoiding the internet