All Insomnia Documentation

  • Insomnia security policies

    Find additional resources that explain how Insomnia prioritizes data protection through encryption, product and application security, and organizational measures.

  • Data security

    Learn the options that Insomnia offers to encrypt and store encrypted data.

  • Collected data

    Insomnia collects usage analytics data to help improve the application.

  • Incident response and vulnerability management

    We monitor the security of our products and applications through various ongoing activities, including logs.

Something wrong?

Help us make these docs great!

Kong Developer docs are open source. If you find these useful and want to make them better, contribute today!