Security

This page provides information about how we secure and protect data

General information

B6 Cloud uses a reliable physical infrastructure and runs on a secure network that's built around data security to ensure that your information remains private, secure and available. Our servers are hosted on Amazon Web Services platform. As of this date, AWS has certifications for compliance with ISO/IEC 27001:2013, 27017:2015 and 27018:2014, is certified as a PCI DSS 3.2 Level 1 Service Provider, and undergoes SOC 1, SOC 2 and SOC 3 audits (with semi-annual reports).

Security features

Product security

Permissions

Global access rules allow admins to set permission levels for everyone in the organization, and project-level access controls allow permission levels to be set for application types.

Secure passwords

B6 Cloud stores passwords using BCrypt with unique salts.

High availability

We ensure high availability with automated and manual testing, regular performance benchmarking, production logging and alerts, fast continuous deployments, and industry-standard cloud infrastructure.

Network and application security

Hosting and storage

B6 Cloud services and data are hosted in Amazon Web Services (AWS) facilities (us-east-1) in the US East (N. Virginia) within a virtual private network that cannot be accessed via the public internet, except via our public-facing proxy servers. All data is encrypted at rest via AWS RDS AES-256 Encryption.

Encryption

Data is encrypted while moving between us and the browser with Transport Level Security (TLS). We score an ‘A+’ rating on Qualys SSL Labs‘ tests.

Backups & monitoring

We use AWS RDS’ backup solution for datastores that contain customer data. Data is automatically backed up every 10 minutes, and we keep daily backups for 14 days.

Compliance

PCI DSS

All payments made to us go through our payments provider, Stripe. Details about their security setup and PCI compliance can be found on Stripe’s security page.

Other security features

Confidentiality

All employee and contractor agreements include a confidentiality clause.

Subprocessors

We work with the following companies and tool systems to store, analyze, and transmit data for our users. They've been carefully vetted for best-in-class security practices.