Security

Huddle01 Cloud is operated by Graphene 01 Inc.

Our Commitment

Our Commitment

At Huddle01 Cloud, security isn't an afterthought, it's foundational to how we build and operate our cloud infrastructure. We understand that you're trusting us with your workloads, and we take that responsibility seriously.

We’re here to make high-performance cloud compute radically efficient, transparent, and accessible to every builder. Bare-metal power at cloud scale, engineered for speed and affordability.

Compliance & Certifications

Compliance & Certifications

SOC 2 Type 2 Certified

SOC 2 Type 2 Certified

Huddle01 Cloud has completed a SOC 2 Type 2 examination conducted by an independent third-party auditor. This audit evaluated the design and operating effectiveness of our controls over a 12-month period.

Report Type

Report Type

Report Type

SOC 2 Type 2

SOC 2 Type 2

SOC 2 Type 2

Trust Services Criteria

Trust Services Criteria

Trust Services Criteria

Security, Availability, Confidentiality

Security, Availability, Confidentiality

Security, Availability, Confidentiality

Audit Period

Audit Period

Audit Period

December 16, 2024 – December 15, 2025

December 16, 2024 – December 15, 2025

December 16, 2024 – December 15, 2025

Auditor

Auditor

Auditor

Precision Assurance CPA LLC

Precision Assurance CPA LLC

Precision Assurance CPA LLC

Result

Result

Result

Unqualified opinion (no exceptions noted)

Unqualified opinion (no exceptions noted)

Unqualified opinion (no exceptions noted)

Want the full report? We share our complete SOC 2 report with customers and qualified prospects under NDA.

Access Control

Access Control

Zero-Trust Architecture

Zero-Trust Architecture

We assume no traffic is safe. Our infrastructure creates a strict boundary between management and public networks.

  • Dark Control Plane: Our control servers, storage servers, and compute hypervisors are not reachable from the public internet.

  • Encrypted Mesh: All administrative communication occurs over encrypted WireGuard tunnels.

  • Micro-Segmentation: Customer workloads are strictly isolated using kernel-level namespacing and VLAN separation (vRack) to prevent lateral movement.

Authentication & Authorization

Authentication & Authorization

We have eliminated static keys. Access to Huddle01 Cloud infrastructure is governed by strictly identity-based protocols.

  • Multi-Factor Authentication: MFA is mandatory for all infrastructure access, code repositories, and cloud provider accounts.

  • Ephemeral Credentials: We utilize short-lived x.509 certificates for all internal access. No static SSH keys exist on our servers.

  • Principle of Least Privilege: Access is granted based on role requirements with documented approval workflows.

  • Just-in-Time (JIT) Privilege: Administrative access is zero-standing. Engineers must request role-based access for specific time windows, which requires explicit approval.

  • Forensic-Grade Auditing: Every SSH and Kubernetes session is recorded for audit playback, linking every keystroke to a specific identity.

Monitoring & Incident Response

Monitoring & Incident Response

Continuous Monitoring

Continuous Monitoring

  • Real-Time Metrics: Infrastructure health is continuously monitored across all regions with automated alerting for anomalies.

  • Centralized Logging: Security events, access logs, and system events are aggregated centrally with retention policies aligned to compliance requirements.

  • Session Recording: All administrative sessions are recorded with full playback capability for audit and forensic purposes.

Incident Response

Incident Response

We maintain a formal incident response program:

  • Classification Framework: Incidents are categorized by severity (Low, Medium, High, Critical) with defined response procedures for each level.

  • On-Call Coverage: Critical incidents trigger immediate notification to our on-call engineering team.

  • Post-Incident Reviews: All high-severity incidents undergo post-mortem analysis to identify root causes and prevent recurrence.

External Monitoring

External Monitoring

We maintain a public status page at status.huddle01.com for real-time visibility into system availability and any ongoing incidents.

Change Management

Change Management

Secure Development Lifecycle

Secure Development Lifecycle

  • Version Control: All code including infrastructure-as-code is managed in version control with full audit history.

  • Mandatory Review: All changes require peer review before deployment. No single individual can push changes to production unilaterally.

  • Automated Testing: CI/CD pipelines run automated tests on all changes before they can be merged.

  • Staged Rollouts: Changes are validated in staging environments before production deployment.

Infrastructure Changes

Infrastructure Changes

  • Infrastructure as Code: All infrastructure configurations are managed as code with the same review and approval processes as application code.

  • Dry-Run Validation: Infrastructure changes are tested via dry-run before application to production.

  • Emergency Procedures: Emergency changes follow documented procedures with mandatory post-incident review.

Data Protection

Data Protection

Data Handling

Data Handling

  • Data Classification: We maintain an inventory of stored data with appropriate classification levels.

  • Data Minimization: We collect only the data necessary to provide our services.

  • Encryption in Transit: TLS is enforced for all services. Administrative traffic is encrypted via WireGuard.

  • Encryption at Rest: Sensitive data and configurations are encrypted at rest.

Data Deletion

Data Deletion

  • Account Deletion: Users can request complete account deletion once billing is settled.

  • Tenant Purge: Infrastructure resources (VMs, volumes, images) can be fully purged upon request.

Privacy

Privacy

Our data handling practices are documented in our Privacy Policy. We process data in accordance with applicable regulations.

Business Continuity

Business Continuity

Availability

Availability

  • Multi-Region Deployment: Our services are deployed across multiple geographic regions with regional isolation. Regional failures do not cascade.

  • Load Balancing: Traffic is distributed across multiple targets to prevent hotspots and ensure high availability.

  • Capacity Monitoring: We monitor resource utilization and plan capacity proactively.

Recovery

Recovery

  • Defined Objectives: We maintain documented Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) for critical systems.

  • Backup Strategy: Critical data is backed up with point-in-time recovery capabilities.

  • Disaster Recovery: Formal business continuity and disaster recovery procedures are documented and maintained.

Your Responsibilities

Your Responsibilities

Security is a shared responsibility. While we secure the infrastructure, you are responsible for:

  • Credential Management: Securing your Huddle01 Cloud API keys, account credentials, and enabling MFA on your accounts.

  • Guest OS Security: Patching your VM operating systems, configuring host-level firewalls, and managing access keys within your VMs.

  • Application Security: Securing the applications you deploy on our Managed Kubernetes and Container Services.

  • Data Backup: Backing up your application data to external locations. We provide infrastructure availability, but application-level backup is your responsibility.

Security Policies

Security Policies

Our operations are governed by comprehensive security policies, including:

  • Information Security Policy

  • Access Control Policy

  • Network Security Policy

  • Data Protection & Privacy Policy

  • Incident Response & Classification Framework

  • Change Management Policy

  • Secure Software Development Lifecycle (SDLC) Policy

  • Vulnerability & Patch Management Policy

  • Business Continuity & Disaster Recovery Policy

  • Third-Party & Vendor Management Policy

These policies are reviewed and approved annually by management.

Request Our SOC 2 Report

Request Our SOC 2 Report

We're happy to share our complete SOC 2 Type 2 report with customers and qualified prospects under NDA.

For security questions or to report a vulnerability, contact us at: support@huddle01.com


Last updated: January 2026

Have questions? Connect with us

Have questions? Connect with us