Access 

    The customer is responsible for controlling the SSH private key paired to the supplied SSH public key.

    Authentication 

    Customer authentication is achieved by verifying the SSH key pair.

    Transport 

    Browser based access utilizes Transport Layer Security (TLS), version 1.2 or greater.

    Configuration information, cache control, and billing information is access via Secure Shell (SSH) using industry standard encryption algorithms.

    Workload 

    The customer controls and is thus responsible for the security aspects of their CI jobs.