Webinar - May 21Building Regulated Infrastructure: How Lucis Standardized Security for Global Care
Platform/05 · Secure

Security,
by design.

SAML/SSO, RBAC, audit logs, policy-as-code - and your workloads, your data, your secrets never leaving your cloud account.

100 %
your infrastructure
SOC 2 · HIPAA
control-ready
Full
audit trail
SAML + RBAC
on every plan
Why this layer exists

Most PaaS
fail the audit.

Your data cannot leave your VPC. Your compliance officer needs an audit trail. Your CISO wants SSO, not a shared admin password.

01

Your data, your perimeter

Qovery runs a thin control plane. Your workloads, your secrets, your databases never leave your cloud account.

02

Every action, auditable

Every deploy, config change, RBAC mutation and access grant is timestamped, actor-attributed and exportable.

03

Policy as code, not slides

Who can deploy to prod? What environments need a second approver? Encoded in Qovery, enforced at the API, reviewed as PRs.

What Secure gives you

Controls,
out of the box.

Six capabilities that take Qovery from "fits dev velocity" to "passes the audit."

01SAML / SSO

Okta, Entra ID, Google Workspace, JumpCloud, any SAML 2.0 IdP. SCIM provisioning.

02RBAC, project-scoped

Roles map to real jobs - owner, admin, deployer, viewer, billing. Scoped per project, per environment.

03Audit logs, exportable

Every action, timestamped and actor-attributed. Streamed to S3, Splunk, Datadog or your SIEM.

04Secrets, in your vault

Native HashiCorp Vault, AWS Secrets Manager, GCP Secret Manager, Azure Key Vault bindings.

05Your data never leaves

The data plane runs in your cloud account. Qovery's control plane ingests metadata only.

06Compliance-ready controls

Mapped for SOC 2, HIPAA, PCI-DSS, ISO 27001, GDPR. Customer-facing evidence exports.

AI Agentic Layer

The agent
stays in bounds.

The Agentic layer operates inside the same RBAC, policy-as-code and approval rules as your humans.

$ Give our new data science team read access to staging, no prod. Rotate the Snowflake token while you're at it.
Create group ds-team · SAML mapping [email protected]
Grant role viewer on project analytics-staging · deny prod
Rotate SNOWFLAKE_INGEST_TOKEN · new value written to AWS Secrets Manager
Update 3 services to reference new secret · blue-green rollout planned
Audit entries written · awaiting approval from @security-lead
SCOPED

Operates inside policy

The agent cannot cross an RBAC boundary, touch a production secret or merge without required approvers.

SIGNED

Every action is signed

Audit entries distinguish human actors from agent actors - with the prompt, the plan, and the approver.

REVERSIBLE

Undo is first-class

Rotated the wrong key? Revoked the wrong role? One command restores the prior state.

"We are a regulated insurance carrier. Our auditors asked for the evidence pack. Qovery exported it in four clicks."
Tobias Winther, CISO · Getsafe

Pass the audit.
Ship the feature.

Run Qovery in your cloud, under your rules. SAML, RBAC, audit logs, policy-as-code - on every plan.