Security that
scales with you.

Vercel strives to maintain and provide a secure Frontend Cloud experience.

Our Shared Responsibility Model conveys the importance of our partnership with our customers.

Certificate of ISO 27001
ISO 27001
Certificate of SOC 2
SOC 2
Certificate of PCI DSS
PCI DSS
Certificate of HIPAA
HIPAA
Certificate of GDPR
GDPR
Certificate of DPF
DPF

Scalable application security and DDoS mitigation with Vercel Firewall.

The Vercel Firewall delivers multi-layer protection against application-layer attacks, DDoS threats, and bots.

Global protection

Edge-localized protection.

L3/L4 protection at every edge location. Your site stays protected without adding latency.

  • L3/L4 DDoS Protection
  • Global L7 Firewall
  • Bot Management

DDoS mitigation

Automatic DDoS Mitigation for all plans.

Embedded bot management and protection against traffic abuse.

198.51.100.227
t13d1726h2
/wp-admin
continent=europe

Powerful Rules Engine

Custom rule management, for everybody.

Instantly create and enforce the rules unique to your business.

Vercel Security Checkpoint
To ensure a smooth and safe experience, we’re taking a few moments to verify your browser.

Attack Challenge Mode

Protect your site when under attack.

Prevent malicious traffic by showing a verification challenge for visitors.

Vercel Web Application Firewall. Next-level security, seamlessly integrated.

Learn more

Observability

Maintain visibility into key metrics and production deployments, allowing you to monitor threats and requests in real-time.

Managed Rulesets

Enterprise

Activate Vercel’s managed rulesets to protect against top priority risks, including OWASP Top 10.

Framework-aware rules

Define rules based on your framework's routes rather than fiddling with regular expressions or prefixes.

Firewall API

Programmatically manage WAF rules and integrate with third-party tools for continuous, dynamic security.

Rate Limiting

Control the frequency of requests made to your web applications and APIs.

Instant Rollback

Quickly revert to previous versions of firewall rules to ensure continuous protection without unintended outcomes.

Instant propagation

Uses the same propagation pipeline as our cache infra, so firewall changes can be seen across the globe in 300ms.

Persistent actions

Block matching requests from a suspicious client for a set duration, preventing repeat malicious behavior and preventing unnecessary resource use.

Extend your backend

Create a secure, isolated bridge from Vercel to your on-premise backend or Kubernetes services with Vercel Secure Compute.

Talk to an Expert

Dedicated environments

Private and dedicated access to build and runtime environments.

VPN and VPC peering

Secure runtime environments, without extra backend complexity.

Define your regions

Multiple availability zone redundancy by default.

Designed for high availability.

Every layer of Vercel’s infrastructure is designed for ultimate redundancy and resiliency, so your app stays online, even during the unexpected.
Automatic failover.

Traffic is routed to the nearest region in the face of incidents or network outages, for resilient protection against full regional downtimes.

The world map in polka dot style, some dots are highlighted in blue.
Multi-layered redundancy.

Static assets are automatically replicated and cached across the Vercel Edge Network, with Anycast routing to ensure the lowest latency.

Workspace Security.

Role-based Access Control

Assign roles to ensure that the right people have the right permissions to work on your projects.

Deployment Protection

Secure your Vercel project’s preview and production URLs. Fine-grained access control for deployments.

Audit Logs

Enterprise

Track and analyze your team members' activity. Accessed by team members with the owner role.

Directory Sync

Enterprise

Manage your organization’s memberships from third-party identity providers.

  • @acme/design

    Avatar for raunoAvatar for gennydeeAvatar for gln
  • @acme/eng

    Avatar for timerAvatar for jaredAvatar for cramforceAvatar for gkaragkiaourisAvatar for tomocchino
  • @acme/security

    Avatar for ty-sbanoAvatar for aaronbrownAvatar for kacee
  • @acme/marketing

    Avatar for greetahAvatar for m0rganeAvatar for lindsaygilson
  • Code Owners.

    Ensure the right people review the right code, with the right context.

  • Current Score

    Excellent

    9.6

  • Major Issues

    Across 6 projects

    3

  • Minor Issues

    Across 12 projects

    8

  • Conformance.

    Catch issues before they become security vulnerabilities.

    Security in the Software Development Lifecycle.

    About our Code Checks

    Frequently asked questions.

    Does Vercel offer DDoS protection?
    Yes. Vercel Enterprise customers are covered by two forms of DDoS protection. Our systems can automatically detect and block malicious attacks on customer sites. For significantly larger, distributed attacks, we work closely with the customer to ensure your site(s) stay online. The combination of automated prevention and direct communication from our Customer Success Managers helps ensure your site is resilient to attacks. Contact us to learn more.
    Is Vercel SOC 2 Type 2 compliant?
    Yes, Vercel has a SOC 2 Type 2 attestation. Contact us for more details or to access the report.
    Is Vercel GDPR compliant?
    Yes. For more information, see our Privacy Policy. No data is stored permanently inside EU regions. Static assets and Serverless Functions responses can be cached in EU regions, but it is ephemeral. Vercel provides a Data Processing Addendum (DPA) which describe our Technical and Organizational Security Measures. For more information, our Privacy Policy explains how information is collected, used, processed and disclosed by Vercel.
    Is Vercel ISO 27001 certified?
    Yes, Vercel is ISO 27001:2013 certified. Contact us for more details or to access the certificate.
    Is Vercel certified under the Data Privacy Framework (DPF)?
    Yes, Vercel is certified under the DPF. Our public listing is available at https://www.dataprivacyframework.gov/list. For more information, see our Privacy Notice.
    Does Vercel support HIPAA compliance?
    Vercel supports HIPAA compliance for enterprise customers. Our HIPAA report is available upon request at security.vercel.com. Contact us for more details if HIPAA is important for you.
    Does Vercel support PCI compliance?
    Yes, Vercel has a Self-Assessment Questionnaire (SAQ)-D Attestation of Compliance (AOC) for Service Providers and a Self-Assessment Questionnaire (SAQ)-A Attestation of Compliance (AOC) for Merchants based on PCI DSS v4.0. Contact us for more details or to access these reports.
    Can I protect my deployments?
    Yes. Vercel offers flexible access options. Any plan has access to Deployment Protection which include Vercel Authentication and Shareable Links (Hobby plan limited to 1 link per account). Customers on the pro plan can opt-in to Advanced Deployment Protection for $150 which offers Password Protection, Deployment Protection Exceptions and Private Production Deployments.
    Does Vercel encrypt data?
    Yes. Data is encrypted at rest (AES-256) and in transit (HTTPS / TLS), including sensitive information like access tokens and secrets.
    Does Vercel backup the data on its platform?
    Yes. Our current backup interval is every two hours and each backup is persisted for 1 month. Automatic backups are taken without affecting the performance or availability of the database operations. All the backups are stored separately in a storage service, and those backups are globally replicated for resiliency against regional disasters. If a database instance is deleted, all associated backups are also automatically deleted. Backups are periodically tested by the Vercel engineering team.
    What infrastructure does Vercel use?
    The Vercel Edge Network & deployment platform primarily uses Amazon Web Services (AWS). In the case of an AWS outage, our network is resilient to regional downtime. Vercel will automatically route traffic to the nearest available edge. Vercel.com uses Azure CosmosDB to store and globally replicate data, which is different than our Edge Network. This is an additional step taken to ensure uptime for applications on our platform.
    Does Vercel provide infrastructure segregation?
    Enterprise Teams on Vercel have their own build infrastructure ensuring isolation from Hobby/Pro accounts on Vercel.
    Does Vercel conduct regular penetration testing and vulnerability scans?
    Yes. Vercel conducts regular penetration testing with third-party experts. In addition to our annual penetration tests, we consistently perform targeted assessments on an ongoing basis. We also implement daily code reviews, static analysis checks, and dependency scanning at the code level. Our cloud security posture management platform (CSPM) facilitates workload vulnerability scanning. Pro and Enterprise customers have access to our latest annual penetration testing reports.
    Does Vercel use subprocessors?
    Yes, a list of our current subprocessors can be found on our subprocessors page.
    Does Vercel have a bug bounty program?
    Yes. Vercel has a Private Bug Bounty program that rewards researchers for finding and reporting security vulnerabilities. For more information, or to report a vulnerability, please reach out to us at responsible.disclosure@vercel.com
    Does Vercel offer a Web Application Firewall?
    Yes, Vercel offers a project-level configurable WAF. This builds upon the robust protection of our platform-wide firewall, adding an extra layer of defense against common web threats. Our WAF gives you greater visibility and control over your application's security, empowering you to build with confidence. Learn more about Vercel's WAF in our blog post.
    Does Vercel protect against OWASP Top 10?
    Yes. Vercel offers managed rulesets, including one specifically designed to protect against the OWASP Top 10 risks. This feature is available on Enterprise plans.
    What is Vercel Access Security?
    Vercel Access Security is a multi-layered system that ensures the right people have access to the right resources, including deployments and workspaces. It uses role-based access control (RBAC), single sign-on (SSO), directory synchronization, and other features to verify user identities and control their permissions within the Vercel dashboard. This ensures that only authorized users can access sensitive information and perform specific actions.
    What is Vercel Infrastructure Security?
    Vercel Infrastructure Security is our comprehensive approach to protecting your applications and data at the infrastructure level. We implement multiple layers of security, including SSL Certificates and HTTPS encryption, hardened backend, Vercel-managed infrastructure, and Secure Compute for customers to define a trusted perimeter around their applications and connected services, providing an additional layer of isolation and protection.
    What is Vercel Application Security?
    Vercel's Application Security is a comprehensive suite of built-in security tools that act as a protective shield for your applications, filtering out malicious or unwanted traffic and ensuring that only legitimate users can access your applications. This approach enhances security by protecting your applications from attacks and vulnerabilities, optimizes performance by ensuring efficient infrastructure use, and improves cost efficiency by preventing unnecessary traffic. Vercel's native application security tools provide a level of protection and performance optimization that sets us apart from other providers.