← Back to Cova
C
Cova

Security

Last updated: March 27, 2026

1. Overview

Cova is a monitoring intelligence platform that connects to your existing DevOps tools to identify coverage gaps and misconfigurations. Security is foundational to how we build and operate the product - your monitoring data, API credentials, and source code are treated with the same care you would expect from any tool in your infrastructure stack.

This page documents our current security practices so you can evaluate Cova with confidence.

2. Data Encryption

At rest

All third-party API keys and tokens are encrypted using Fernet symmetric encryption (AES-128-CBC with HMAC-SHA256) before being written to the database. Encryption keys are stored separately from encrypted data and are never committed to source control.

In transit

All connections to Cova use HTTPS/TLS. There is no plaintext HTTP endpoint. API calls from Cova to your monitoring tools (Datadog, PagerDuty, etc.) also use HTTPS exclusively.

3. Authentication

Cova supports three authentication methods:

Session management

4. API Key Storage

When you connect a monitoring tool, your API key is:

  1. Validated against the tool's API to confirm it works
  2. Encrypted with Fernet and stored in the database
  3. Masked in all logs, API responses, and UI displays (only the last 4 characters are shown)
  4. Never sent to any third party other than the tool it belongs to
  5. Deleted immediately when you disconnect the tool or delete your account

Your frontend never re-sends API keys after the initial connection. All subsequent analysis requests use the encrypted credentials stored server-side.

5. Third-Party AI

Cova uses the Anthropic Claude API for AI-powered analysis, recommendations, and monitor config generation.

What we send to Anthropic

What we never send to Anthropic

Anthropic's data policy

Cova uses the Anthropic API with a zero-retention policy - Anthropic does not store or use API inputs/outputs for training. See Anthropic's privacy policy for details.

6. Infrastructure

ComponentProviderDetails
Application hostingRenderHTTPS-only, SOC 2 Type II compliant infrastructure, US-based
DatabaseNeon (PostgreSQL)Encrypted at rest, TLS connections, automated backups
Email deliveryResendUsed only for verification codes and team invites
AnalyticsGoogle Analytics 4Anonymous, aggregated usage stats only. No personal identifiers.

7. Source Code Access

When you connect GitHub or GitLab for Repo Scan or PR Guard:

8. Deploy Monitor (Write Access)

Cova's Deploy Monitor feature can create or update monitors directly in your monitoring tools. This is the only feature that performs write operations against your tools.

9. Data Retention

Data TypeRetentionDeletion
Account dataWhile account is activeDeleted within 30 days of request
Analysis historyWhile account is activeIndividual analyses can be deleted anytime
API credentialsWhile tool is connectedImmediate on disconnect or account deletion
Audit logsPro: 30 days, Enterprise: 1 yearAutomatic expiry, deleted on account deletion
Login logs12 monthsAutomatic expiry
Verification codes10 minutesAutomatic expiry
Source codeNot persistedProcessed in memory and discarded

When you delete your account, all associated data is cascade-deleted across all database tables. This includes sessions, credentials, analyses, scans, feature grants, team memberships, and usage counters.

10. Audit Logging

All write actions in Cova are logged with structured audit entries that include the user, action type, target, and relevant details. Audited actions include:

Audit logs are stored in our database and available to Pro and Enterprise plan users through the Settings page. Pro plans retain 30 days of audit history. Enterprise plans retain 1 year of audit history.

11. Contact

For security questions, vulnerability reports, or data requests:

Email: security@getcova.ai

General: privacy@getcova.ai

Website: getcova.ai