Operational practice
How we run and review the service
Security also depends on deployment discipline, vendor management, and clear response processes when events need attention.
Every mutation — entity creation, permission change, agent execution — is recorded in an immutable audit log scoped to the workspace. Logs are retained for the lifetime of the workspace and can be exported for internal reviews, investigations, and customer security discussions.
Rubin runs on hardened cloud infrastructure with automated patching, network-level segmentation, and DDoS mitigation. Production systems are monitored continuously with anomaly detection and on-call response. Changes to production systems pass through peer review, automated checks, dependency scanning, and staged rollouts.
Production workloads run on major cloud regions with redundancy and encrypted volumes. Enterprise customers can align deployment choices with residency and data-processing requirements where technically feasible. We maintain an inventory of subprocessors (hosting, email, analytics where used, model APIs) and notify material changes in line with our agreements.
We maintain incident response runbooks, on-call rotations, and post-incident reviews. If an incident may affect your workspace, we notify you without undue delay with what we know, what we are doing, and what you should do next. Enterprise agreements can define contact paths, severity thresholds, and joint tabletop exercises.
We support vendor security questionnaires, architecture reviews, and shared-responsibility discussions with your security team. We can share current documentation about our controls, data flows, and subprocessors as appropriate for procurement and technical review.
If you discover a security issue, please reach us at security@rubin.zone . We triage reports within 24 hours and will keep you informed throughout the resolution process.