Access
The customer is responsible for controlling the SSH private key paired to the supplied SSH public key.
Authentication
Customer authentication is achieved by verifying the SSH key pair.
Transport
Browser based access utilizes Transport Layer Security (TLS), version 1.2 or greater.
Configuration information, cache control, and billing information is access via Secure Shell (SSH) using industry standard encryption algorithms.
Workload
The customer controls and is thus responsible for the security aspects of their CI jobs.