Last updated: March 27, 2026
Cova is a monitoring intelligence platform that connects to your existing DevOps tools to identify coverage gaps and misconfigurations. Security is foundational to how we build and operate the product - your monitoring data, API credentials, and source code are treated with the same care you would expect from any tool in your infrastructure stack.
This page documents our current security practices so you can evaluate Cova with confidence.
All third-party API keys and tokens are encrypted using Fernet symmetric encryption (AES-128-CBC with HMAC-SHA256) before being written to the database. Encryption keys are stored separately from encrypted data and are never committed to source control.
All connections to Cova use HTTPS/TLS. There is no plaintext HTTP endpoint. API calls from Cova to your monitoring tools (Datadog, PagerDuty, etc.) also use HTTPS exclusively.
Cova supports three authentication methods:
When you connect a monitoring tool, your API key is:
Your frontend never re-sends API keys after the initial connection. All subsequent analysis requests use the encrypted credentials stored server-side.
Cova uses the Anthropic Claude API for AI-powered analysis, recommendations, and monitor config generation.
Cova uses the Anthropic API with a zero-retention policy - Anthropic does not store or use API inputs/outputs for training. See Anthropic's privacy policy for details.
| Component | Provider | Details |
|---|---|---|
| Application hosting | Render | HTTPS-only, SOC 2 Type II compliant infrastructure, US-based |
| Database | Neon (PostgreSQL) | Encrypted at rest, TLS connections, automated backups |
| Email delivery | Resend | Used only for verification codes and team invites |
| Analytics | Google Analytics 4 | Anonymous, aggregated usage stats only. No personal identifiers. |
When you connect GitHub or GitLab for Repo Scan or PR Guard:
Cova's Deploy Monitor feature can create or update monitors directly in your monitoring tools. This is the only feature that performs write operations against your tools.
generated-by:cova so you can identify and remove them.| Data Type | Retention | Deletion |
|---|---|---|
| Account data | While account is active | Deleted within 30 days of request |
| Analysis history | While account is active | Individual analyses can be deleted anytime |
| API credentials | While tool is connected | Immediate on disconnect or account deletion |
| Audit logs | Pro: 30 days, Enterprise: 1 year | Automatic expiry, deleted on account deletion |
| Login logs | 12 months | Automatic expiry |
| Verification codes | 10 minutes | Automatic expiry |
| Source code | Not persisted | Processed in memory and discarded |
When you delete your account, all associated data is cascade-deleted across all database tables. This includes sessions, credentials, analyses, scans, feature grants, team memberships, and usage counters.
All write actions in Cova are logged with structured audit entries that include the user, action type, target, and relevant details. Audited actions include:
Audit logs are stored in our database and available to Pro and Enterprise plan users through the Settings page. Pro plans retain 30 days of audit history. Enterprise plans retain 1 year of audit history.
For security questions, vulnerability reports, or data requests:
Email: security@getcova.ai
General: privacy@getcova.ai
Website: getcova.ai