Skip to main content
Security

Built to be on your critical path.

When your infrastructure depends on ngrok, our security is part of yours. We treat it that way.

Visit the Trust Center

Trusted by security leadership around the globe

  • Calendly
  • Cyera
  • Databricks
  • GitHub
  • Grafana
  • Harvey
  • Hugging Face
  • Mercor
  • Microsoft
  • Okta
  • Open AI
  • Perplexity
  • Ramp
  • Schneider Electric
  • Twilio
  • Vercel
  • Windsurf
  • Zoom
How we secure our service

We operate with defense in depth and least privilege.

Together, they prevent any compromised component from taking down the whole system.

Data at rest

All databases, filesystems, and data warehousing are encrypted at rest. Secrets you upload are further encrypted at the application layer with keys only we control.

Data in transit

Agent-to-edge connections use TLS 1.2+. Endpoints get HTTPS with automatic certificate provisioning. For stricter requirements, configure end-to-end encryption so ngrok never terminates TLS and only sees ciphertext.

Network architecture

ngrok separates its control plane from its data plane. The control plane handles account configuration and API requests from a US-based AWS region. Regional data planes route traffic through global Points of Presence. Pin to a specific region to meet data residency requirements.

US East (Ohio)
US West (California)
Europe (Frankfurt)
Asia Pacific (Singapore)
Australia (Sydney)
India (Mumbai)
Japan (Tokyo)
S. America (São Paulo)

Least-privilege production access

Engineers get only the access they need. Shell access uses SSH certificate authorities for time-limited grants, every grant is audit-logged, and services assume least-privilege roles scoped to each operation.

Change management

Every change is automatically scanned for CVEs, syntax errors, and outdated dependencies. Nothing merges without passing automated tests and a human code review. Deployments and infrastructure changes are fully automated.

Developer access

MFA on every account, SSO for vendor apps, and automated credential rotation. Dev machines require full disk encryption. Every vendor gets a thorough security review before adoption.

Secrets & credentials

Internal secrets are stored in HashiCorp Vault with automated key rotation. For API keys and credential tokens, we only keep one-way salted hashes—never the originals.

Shared responsibility model

A shared responsibility model splits security obligations between the platform and the people using it. The platform secures the infrastructure; you secure how you configure and use it.

  • Our responsibility

    ngrok secures the ngrok service and provides the features you need to secure your own services.

  • Your responsibility

    You're responsible for securing how you use ngrok—granting correct permissions, disabling accounts when employees leave, and keeping ngrok agents up to date.

Platform integrity

We actively fight abuse.

ngrok is a tunneling tool, and tunneling tools attract bad actors. We don't ignore that. Automated systems flag suspicious activity in real time, a dedicated team reviews and bans abusive accounts, and we work with third-party security vendors and ISPs to take down phishing and malware campaigns. Report abuse to abuse@ngrok.com or through our abuse APIs.

How we combat abuse

Report a vulnerability

Found a security issue in ngrok? Report it to security@ngrok.com. We acknowledge every report and work with researchers to resolve issues before disclosure.

Decoration

Have questions about security or compliance?

We're happy to walk through certifications, controls, or enterprise requirements.

Decoration

Frequently asked questions