- Features
- Pricing
- English
- français
- Deutsche
- Contact us
- Docs
- Login

Key takeaway: Security is often treated as a production-only configuration, leaving preview and staging environments as fragmented "shadow" infrastructure. Moving security into the application's code via version-controlled configuration ensures that compliance and protection are inherited by every branch, not just opted into at the finish line.
TL;DR
|
Key takeaway: The speed gained by "dashboard-first" configuration often creates a fragmented security posture that is difficult to audit at scale.
Frontend platforms have mastered the "push to deploy" workflow. This developer experience is genuinely strong, removing the friction between an idea and a URL. However, this strength often creates a structural trade-off: governance becomes a per-feature configuration.
When security controls like deployment protection, secret sensitivity, or authentication are configured via a dashboard toggle, they exist outside the version-controlled history of the application.
For a single project, this is manageable. For a Platform Engineer managing fifty projects, it creates a governance tax where they must manually verify that every preview branch and experimental sandbox has the correct boxes checked.
Key takeaway: Security is only as strong as your least-protected environment, which is typically a "temporary" preview branch.
In modern development, we spin up dozens of environments a week. If those environments require manual setup to become compliant, they often stay naked for the sake of velocity. This creates a gap where:
On Upsun, we remove this trade-off. Because the entire stack (runtimes, services, and routes) is defined in .upsun/config.yaml, the security posture is versioned with the code.
When you branch, you don't just branch the code; you branch the governance.
Key takeaway: Moving the compliance boundary to the platform level ensures that audit scope matches the architecture diagram.
The goal for any senior technical leader is to ensure that security review happens once, at the platform level.
Vercel provides strong security primitives, but they are often stage-dependent. A team's experimental branch may not automatically share the same compliance posture as their production cluster unless specifically configured to do so.
Upsun’s SOC 2 Type 2 and ISO 27001 boundary applies to every environment the platform creates. Whether a developer is sandboxing a new service or pushing to production, the databases, queues, and workers sit inside the same governance boundary.
Is Upsun saying dashboard-driven platforms are insecure?
No. Platforms like Vercel have robust security programs and certifications. The distinction is the management model. Dashboard-driven platforms require you to opt-in and align security settings per project. Upsun uses a GitOps model where security is inherited via code.
How does Upsun handle secrets differently?
Upsun manages secrets via the CLI and API, which are then injected into the environment. Because we use a declarative model, it ensures they are protected by the same platform-level SOC 2 controls across every branch.
Does environment cloning include data security?
Yes. In addition, when Upsun clones an environment, it can trigger automatic PII sanitization via deploy hooks. This ensures that while you get production-parity data for testing, you aren't widening your compliance exposure by moving sensitive data into a development environment.