Auto-destroy on normal expiration. Abnormal shutdowns preserved for security review only. Transparent retention policies.
Short-lived tokens; logout triggers rotation. Expired/rotated tokens are rejected server-side; management actions are audited.
Timer ends → stop signal → volumes unmounted / instance reclaimed → container filesystem cleared → tokens invalidated.
Policy trigger → produce a read-only evidence bundle (snapshot + logs) → sealed on an isolated management network → access by NDA-bound investigators only.
Isolated network, least-privilege accounts, short-lived credentials. Every access is recorded in tamper-evident audit trails.
No. Logout rotates your token. Old tabs/links become invalid and are rejected server-side.
No. Containers are destroyed on expiration, tokens invalidated, and no residuals are retained.
Only to investigate security incidents. A read-only evidence bundle is kept on an isolated network; access is limited to NDA-bound investigators and purged after up to 1 year.
By default, no. Management access uses short-lived credentials on an isolated network and is fully audited.
See the retention matrix above. For region-specific terms, contact support.