SOC 2 Type II
Certified
AES-256
Encryption at Rest
TLS 1.3
Encryption in Transit
GDPR
Compliant
At ElasticFlow, security is foundational to everything we do. We understand that you trust us with sensitive business data, and we take that responsibility seriously. Our security program is designed to:
Security is a company-wide priority, with dedicated resources and executive-level oversight ensuring our commitment is reflected in every aspect of our operations.
We maintain the following certifications and compliance standards:
Annual third-party audit verifying our security controls for data security, availability, processing integrity, confidentiality, and privacy.
Full compliance with the EU General Data Protection Regulation, including data subject rights, breach notification, and international data transfer mechanisms.
Compliance with California Consumer Privacy Act and California Privacy Rights Act requirements for California residents.
Information security management system certification demonstrating our systematic approach to managing sensitive information. (In progress)
Enterprise customers can request copies of our SOC 2 report and other compliance documentation by contacting [email protected].
Our services are hosted on enterprise-grade cloud infrastructure:
Our cloud provider maintains comprehensive physical security controls including 24/7 security personnel, biometric access controls, video surveillance, and environmental controls. Data centers are certified to industry standards including SOC 2 and ISO 27001.
Customer data is logically isolated using robust access controls and tenant identification. Each customer's data is stored separately and is not accessible by other customers.
We maintain a comprehensive incident response plan that includes:
In the event of a security incident affecting your data, we will:
We carefully evaluate the security practices of third-party vendors before engaging them:
We maintain comprehensive business continuity and disaster recovery plans:
We appreciate the security research community and welcome responsible disclosure of potential vulnerabilities.
We run a bug bounty program for security researchers who find and responsibly disclose vulnerabilities.
Report vulnerabilities to: [email protected]
When reporting, please include:
We commit to responding to valid reports within 48 hours and will work with you to understand and address the issue. We will not take legal action against researchers who follow responsible disclosure practices.
For security-related questions, concerns, or to request our security documentation:
Emergency Security Issues: For urgent security matters, email [email protected] with "URGENT" in the subject line.