At NetBox Labs, security isn’t just a feature — it’s at the heart of everything we do.
NetBox Labs is fully SOC 2 Type II compliant, reflecting our unwavering dedication to serving our customers and community with the highest levels of security and reliability. Our SOC 2 Type II Report is just one of the many ways we demonstrate our commitment to maintaining the highest security standards.
Easily secure access to your NetBox Cloud instance by adding IPv4 and IPv6 addresses and ranges to an IP Allow List.
This ensures that our Web UI and API will only accept connections from your authorized source IPs.
Mutual TLS provides advanced connection security for enterprise use cases by ensuring that all clients connecting to NetBox Cloud present a valid security certificate before establishing an encrypted connection.
Combine with IP Allow Lists for ultimate connection security.
Utilize a dedicated IP address for accessing the User Interface (UI) and Application Programming Interface (API) to bolster security and ensure protected connectivity.
Enjoy peace of mind knowing that your NetBox Cloud database is backed up, with the flexibility to choose your desired backup frequency.
Backups are stored with a separate cloud storage provider, in the same region as your NetBox Cloud deployment, as well as being encrypted at rest and in transit.
You can also easily create backups on demand, and download backups for archiving and testing purposes, all via the NetBox Labs Console.
Enhance security for the NetBox Labs Console even further by adding an extra layer of protection beyond just a password.
Make it significantly more challenging for unauthorized users to gain access.
Enable in just a couple of clicks.
NetBox Cloud comes with common SSO integrations (Azure, Okta, Google).
Optional advanced SSO integrations are available, and we are happy to discuss custom requirements.
See our documentation for step-by-step guides on how to configure common SSO integrations.
Customer production data is segmented and only accessible to authorized customers
All production data is stored encrypted at rest
All public-facing internet traffic is encrypted in transit
Automated backups of all customer and system data are performed
Systems that handle confidential information, accept network connections, or make access control decisions retain audit logs
Penetration tests are performed annually
SSO and MFA are required for employee access to the production environment
All vulnerability findings are tracked to resolution in accordance with SLAs
Secure programming standards are followed
Code changes are reviewed by individuals other than the originating code author
All changes to production environments follow change control procedures
Automated vulnerability scanning is employed
Incidents reported to security@netboxlabs.com are responded to promptly
Processes surrounding security incident response are periodically reviewed for effectiveness
Background and reference checks are carried out for all new employees
Employees must periodically complete security awareness training
All vendors and contractors are inventoried and reviewed for risk