Home / Security & Compliance

Security & Compliance

Security & Compliance

Effective: October 2025 · Last updated: October 2025

We protect creator data with layered security, clear governance, and global compliance. Below is a transparent overview of our controls and commitments.

 

Encryption

  • In transit: TLS 1.2+ for all client–server traffic; HSTS enforced.
  • At rest: AES-256 or provider-managed equivalents for databases, object storage, and backups.
  • Key management: Managed KMS with role-scoped access and rotation policies.
TLSAES-256KMS

Access Controls

  • Least-privilege RBAC for staff and services.
  • MFA enforced on administrative systems.
  • SSO support for enterprise customers (on request).
  • Audit logging on sensitive operations.
RBACMFASSO

Application Security

  • Secure SDLC with code review and CI checks.
  • Dependency scanning and container image scanning.
  • Environment segregation for dev/stage/prod.
  • Rate limiting, input validation, and abuse monitoring.
SDLCScanningRate Limits

Vulnerability Management

  • Monthly vulnerability scans; critical issues prioritized.
  • Annual penetration testing by an independent firm.
  • Patch management with defined SLAs by severity.
Vuln ScansPen TestPatch SLAs

Incident Response

  • Documented runbooks and 24/7 on-call rotation.
  • Customer notification without undue delay if required by law.
  • Post-incident reviews and corrective actions.
IR Runbooks24/7Postmortems

Business Continuity

  • Automated backups with integrity checks.
  • Regional redundancy for critical services.
  • Restoration testing and RPO/RTO objectives.
BackupsRedundancyRPO/RTO
 

Data Governance

  • Retention: Kept only as long as needed for Services or as required by law.
  • Deletion: Account deletion triggers scheduled data removal from active systems and backups (within standard retention windows).
  • Exports: