Security at HashiCorp

We know our users place a high level of trust in HashiCorp and the products we make to manage mission critical infrastructure. The security of customer data, of our products, and our services are a top priority. HashiCorp’s best-in-class security starts at the foundational level and includes internal threat models, routine internal and external security assessments, and secure software development.

Security Team

HashiCorp has a fully staffed team of security professionals dedicated to securing, protecting and improving the security posture of the company and its products. The broader security team consists of:

  • Detection & Response
  • Cloud Security
  • Product Security
  • Corporate Information Security
  • Red Team, and
  • Governance, Risk and Compliance (GRC).

Compliance Program

We have a team dedicated to our compliance program and are committed to providing our customers with all relevant security documentation to build a foundation of trust in our company and products. As of December 2020, we now have a SOC 2 Type II report, and an ISO 27001 certification covering the following Products:

ISO 27001

ISO 27001

ISO 27001 is a compliance framework that focuses on security and risk management processes.

Download our ISO 27001 certificate



SOC 2 is a restricted use audit report that focuses on controls relevant to security, availability, and confidentiality of a cloud service.



SOC 3 is a general use audit report that focuses on controls relevant to security, availability, and confidentiality of a cloud service.

Download our SOC 3

If you have any additional questions around our security program, please email


HashiCorp respects your privacy and is committed to protecting your Personal Information (any information that relates to an identified or identifiable individual). Our belief is that any Personal Information provided to us by you is just that: personal and private.

We do not rent, sell or trade your Personal Information.

Our full privacy policy is available at For any privacy related questions, including Data Subject Requests, please email


HashiCorp takes all abuse complaints seriously and can assist in investigation of abuse associated with HashiCorp-managed services.

Information regarding how to report abuse is available at

Penetration Tests

HashiCorp hires external, reputable third parties to perform regular security assessment and penetration testing of our products. Please email for those reports.

Security Updates & Vulnerability Alerts

HashiCorp publishes security updates, which address security vulnerabilities in HashiCorp products, in the Security category of HashiCorp Discuss. This is directly accessible at

Please follow the documented steps to subscribe to email notifications or RSS for all or product-specific HashiCorp security updates.

Vulnerability Reporting

We deeply appreciate any effort to discover and coordinate the disclosure of security vulnerabilities. HashiCorp does not currently operate a public bug bounty program or offer monetary rewards for vulnerability reports, but individuals may be acknowledged in product security bulletins as appropriate.

If you would like to report a vulnerability in one of our products or services, or have security concerns regarding HashiCorp software or systems, please email

To support a timely and effective response to your report, please include any of the following:

  • Steps to reproduce or proof-of-concept
  • Any relevant tools, including versions used
  • Tool output

HashiCorp takes all vulnerability reports very seriously and aims to rapidly respond and verify the vulnerability before taking the necessary steps to address it. After an initial reply to your disclosure, which should be directly after receiving it, we will update you periodically with our response and remediation status.

Security issues related to HashiCorp-owned domains/properties that we have already assessed for risk and will address in future include:

  • HTTPS configuration, including supported TLS versions & ciphersuites
  • HTTP headers, for purposes including Strict Transport Security, Content Security Policy, and clickjacking/XSS protection
  • DNS records including those related to email (SPF, DKIM, DMARC) and certificate issuance (CAA).

Secure Communications

If you would like to secure your communications with us, the following PGP key can be used. You can also fetch our key from Keybase or from most keyservers with the key ID 51852D87348FFC4C and fingerprint 91A6 E7F8 5D05 C656 30BE F189 5185 2D87 348F FC4C.



Release Archive Checksum Verification

If you would like to verify the checksum of a HashiCorp download (such as one from the HashiCorp releases service), please note that only the SHASUM file is signed by the GPG key above. The archives themselves are not signed, but rather hashed. To verify the integrity of a particular archive:

  • Download the archive, SHASUM, and SHASUM.sig files
  • Verify the SHASUM file is properly signed
  • Verify the SHASUM in the file matches the archive

For example:

# This is the public key from above - one-time step.
gpg --import hashicorp.asc

# Download the archive and signature files.
curl -Os
curl -Os
curl -Os

# Verify the signature file is untampered.
gpg --verify vault_0.5.2_SHA256SUMS.sig vault_0.5.2_SHA256SUMS

# Verify the SHASUM matches the archive.
shasum -a 256 -c vault_0.5.2_SHA256SUMS

Linux Package Checksum Verification

HashiCorp's Linux repositories and packages, as announced in 2020, are signed with a separate GPG key. This is available at and, and has the fingerprint E8A0 32E0 94D8 EB4E A189 D270 DA41 8C88 A321 9F7B.

Code Signature Verification

HashiCorp Authenticode signs Microsoft Windows executables and code signs Apple macOS executables.

Apple macOS

Use Apple's codesign utility to verify the integrity of an Apple macOS executable and pay attention to the TeamIdentifier field which should match the one below.

codesign --verify -d --verbose=2 /usr/local/bin/terraform

Authority=Developer ID Application: Hashicorp, Inc. (D38WU7D763)
Authority=Developer ID Certification Authority
Authority=Apple Root CA

Microsoft Windows

Use Microsoft's Get-AuthenticodeSignature cmdlet to verify the integrity of a Microsoft Windows executable and pay attention to the Thumbprint which should match the one below.

(Get-AuthenticodeSignature -FilePath terraform.exe).SignerCertificate | Format-List

Subject      : CN="HashiCorp, Inc.", O="HashiCorp, Inc.", L=San Francisco, S=California, C=US
Issuer       : CN=DigiCert SHA2 Assured ID Code Signing CA,, O=DigiCert Inc, C=US
Thumbprint   : 35AB9FC834D217E9E7B1778FB1B97AF7C73792F2
FriendlyName :
NotBefore    : 16/01/2020 00:00:00
NotAfter     : 20/01/2023 12:00:00
Extensions   : {System.Security.Cryptography.Oid, System.Security.Cryptography.Oid, System.Security.Cryptography.Oid,