Security
BloomSocial is committed to protecting customer data and maintaining a secure, reliable platform. This page outlines our security practices and controls.
1. Security Program Overview
BloomSocial maintains a security program aligned with industry best practices and the SOC 2 Trust Services Criteria, covering security, availability, and confidentiality.
2. Infrastructure Security
- Cloud hosted infrastructure with reputable providers
- Network segmentation and firewall protections
- Secure configuration management
- Regular vulnerability monitoring
3. Data Protection
- Encryption in transit using TLS
- Encryption at rest where applicable
- Logical separation of customer data
- Secure storage of credentials and secrets
4. Access Controls
- Role based access control
- Principle of least privilege
- Multi factor authentication for internal access
- Regular access reviews
5. Application Security
- Secure development lifecycle practices
- Code reviews and automated testing
- Dependency monitoring for vulnerabilities
- Change management controls
- Penetration testing for every release
6. Monitoring and Incident Response
- Centralized logging and monitoring
- Alerting for anomalous behavior
- Documented incident response procedures
- Customer notification in the event of a confirmed data breach
7. Data Retention and Deletion
- Data retained only as required to provide services
- Secure deletion upon termination or request
- Retention aligned with contractual and legal requirements
8. Third Party Risk Management
- Due diligence on subprocessors and vendors
- Contractual security and confidentiality obligations
- Periodic reviews of vendor risk
9. Compliance
BloomSocial supports compliance with:
- GDPR and UK GDPR
- CCPA and CPRA
- PIPEDA
- SOC 2 readiness
Compliance documentation may be provided under NDA.
10. Employee Security
- Background checks where legally permitted
- Security awareness training
- Confidentiality obligations for employees and contractors
11. Business Continuity
- Regular backups
- Disaster recovery planning
- High availability architecture
12. Reporting Security Issues
If you believe you have identified a security vulnerability, contact:
security@bloomsocial.ai