Insomnia logo
  • Documentation
  • Download
  • Upgrade
    • Introduction to Insomnia
    • Install Insomnia
    • Migrate from Designer
    • Import and Export Data
    • Environment Variables
    • HTTP(S) Proxy
    • Insomnia Configuration File
    • Responses
    • Request Collections
    • Request Timeouts
    • Chaining Requests
    • Post CSV Data
    • SOAP Requests
    • Teams
    • Projects
    • Sync with Git
    • Version Control Sync
    • Design Documents
    • Linting
    • GraphQL for OpenAPI
    • Live Preview
    • Unit and Stress Testing
    • Key Security Features
    • Security Standards
    • Signup and Authentication
    • Data Encryption
    • Authentication
    • Client Certificates
    • Generate Code Snippet
    • Cookie Management
    • Encoding
    • GraphQL Queries
    • gRPC
    • Run in Insomnia Button
    • Key Maps
    • Introduction to Plugins
    • Context Object Reference
    • Template Tags
    • Hooks and Actions
    • Custom Themes
    • FAQ
    • Application Data
    • SSL Validation
    • Password Recovery
    • Introduction to Inso CLI
    • Install Inso CLI
    • CLI Command Reference
      • inso generate config
      • inso run test
      • inso lint spec
      • inso export spec
      • inso script
    • Configuration
    • Continuous Integration
    • Publish API to Dev Portal
    • Kong Declarative Config (for decK)
    • Kong for Kubernetes

Security Standards

This document addresses common questions we get about our security standards.

How is data processed when sent to Insomnia servers?

  • Information is sent over TLS
  • Information sent is end-to-end encrypted, learn more here.

Where is our information stored?

  • Information is stored in GCP, in US Central region
  • Information inside of GCP is stored within Postgres

Do we have any compliance certifications?

Not at the moment.

Do you have any penetration test results from external parties?

Not at the moment.

What authentication is implemented by the application?

  • Secure Remote Passwords (SRP) encrypted key exchange protocol.

How often do you release major updates, and or security patches?

  • Major updates are usually released once a month, or every two weeks depending on the scope.
  • Security, and hotfix patches are handled on a case-by-case basis and can occur at any time.

Do you retain server logs, or event logs?

  • All server logs stored, are kept within GCP, and only accessed by engineers authorized to manage the Insomnia servers.

Do you maintain documentation when an incident/event occurs?

  • When an incident occurs, we perform an internal post-mortem and delegate information accordingly. Either through the site in the form of a blog post, or through social media/support on a case-by-case basis.

In case of a breach, do you notify customers?

  • Yes, via email.

What is your primary point of contact?

  • Open Source
  • Support channels
Edit this page
Report an issue
    COMPANY
  • Insomnia
  • Blog
  • Changelog
  • Pricing
  • Careers
    PRODUCTS
  • Insomnia
  • Inso (CLI)
    RESOURCES
  • Sign In
  • Documentation
  • Support
    LEGAL
  • Privacy Policy
  • Terms & Conditions
© Kong Inc. 2021