SOC 2 Type 2
Our SOC 2 Type 2 certification verifies that Bold Reports has successfully completed a thorough audit, ensuring
that our security policies and controls consistently meet the highest industry standards when it comes to
keeping data safe and secret.
GDPR Compliant
As a company, we take data privacy very seriously and maintain GDPR compliance with many customers in Europe.
Datacenter Security
All our platform infrastructure is hosted on Microsoft Azure, Google Cloud Platform (GCP), and DigitalOcean in
the US region. Azure, GCP, and DigitalOcean datacenters are deeply committed to securing the underlying
infrastructure we build on and continuously expanding their compliance programs.
For more details, please refer to the Microsoft, Google, and DigitalOcean datacenter security policies linked
below:
Software Security
Our application runs on the latest stable version of the Microsoft .NET Framework. We reduce the attack surface
by isolating our data processes with containerized microservice architecture. Our application is also automated
with a static analyzer tool that does extensive computation and ensures the security of our source code.
All our developers are trained to pay specific attention toward security. Our automated and manual code review
processes constantly look for any code that could potentially violate security policies.
Payment Security
Bold Reports uses a PCI-compliant payment processor for encrypting and processing credit card payments. We have
partnered with Stripe to securely handle sensitive payment processing data. Details about their security posture
and PCI compliance can be found at Stripe’s Security page.
Bold Reports does not have access to customers’ credit card data at all.
Encrypted Transmission
All user data is transported securely, encrypted in transit and encrypted at rest. Encrypting your data provides
an additional layer of protection against events such as unauthorized modification and man-in-the-middle
attacks. We use 256-bit SSL/TLS.1.2 encryption and industry-standard AES-256 algorithms.
Vulnerability Scans
Bold Reports uses security tools to continuously scan for vulnerabilities. Additionally, vulnerabilities in
third-party libraries and tools are monitored and software is patched or updated promptly when new issues are
reported.
Penetration Testing
Bold Reports undergoes regular penetration testing done by our in-house security experts and development team. A
yearly detailed penetration test suite by third-party security experts is done to confirm the security of our
products and environment.
Monitoring and Alerting
Our application and the underlying infrastructure components are actively monitored 24/7. Our engineers are
immediately notified in case of an outage.
Uptime
Bold Reports has a 99.9% uptime or higher. If our systems require maintenance or a brief outage, clients will be
notified in advance.
Backup and Availability
To maximize availability, our systems automatically replicate your data across multiple locations in real-time.
Data is also continuously backed up to ensure that we can restore access to your data and the service in the
unlikely event that all data replicas fail simultaneously. Our monitoring system alerts us to any problems, and
we have staff on call at all times to handle any unexpected incidents.