Security at Bondi

Enterprise-grade security and privacy to protect your business

Last Updated: November 2025

1. Our Security Commitment

At Bondi, security isn’t just a feature-it’s the foundation of everything we build. We understand that you trust us with your most valuable business data, and we take that responsibility seriously.

Our Mission: To provide a secure, reliable platform that protects your data while enabling your team to work productively and confidently.

Security-First Approach

Security is embedded in every layer of our platform:

  • By Design: Security considerations from the first line of code
  • By Default: Secure configurations out of the box
  • Continuously: Ongoing monitoring, testing, and improvement
  • Transparently: Open communication about our security posture

Your Data, Your Control

  • Full ownership of your data-we never sell or misuse it
  • Privacy-first design with minimal data collection
  • Data residency options to meet regulatory requirements
  • Easy export and deletion when you need it

2. Data Protection

2.1 Encryption

Data in Transit:

  • TLS 1.3 or higher for all connections
  • Perfect Forward Secrecy (PFS) enabled
  • Strong cipher suites only (no weak or deprecated protocols)
  • HTTPS enforced across all domains
  • Secure WebSocket connections (WSS)

Data at Rest:

  • AES-256 encryption for all stored data
  • Encrypted database storage (AWS RDS encryption)
  • Encrypted file storage (AWS S3 server-side encryption)
  • Encrypted backups
  • Secure key management practices

Password Protection:

  • Industry-standard hashing with bcrypt or Argon2
  • Salted and hashed-never stored in plain text
  • Strong password requirements enforced
  • Regular password security audits

2.2 Data Residency & Sovereignty

European Union Data Protection:

For customers in the European Union and United Kingdom:

  • Primary data storage: AWS Frankfurt (Germany) or Dublin (Ireland)
  • Data stays in the EU for EU customers
  • No unauthorized transfers outside the EEA
  • Compliant with GDPR data residency requirements

Why This Matters:

  • Reduced latency for European users
  • Full compliance with GDPR and EU data protection laws
  • Sovereignty over your data location
  • Protection from foreign surveillance laws

Data Processing:

  • Limited processing by authorized sub-processors (see our Data Processing Agreement)
  • Standard Contractual Clauses (SCCs) for any US-based services
  • Supplementary technical measures (encryption, access controls)

2.3 Data Handling Principles

Data Minimization:

  • We collect only what’s necessary to provide our services
  • No excessive or unnecessary data gathering
  • Regular reviews of data collection practices

Purpose Limitation:

  • Data used only for stated purposes
  • No secondary use without consent
  • Clear communication about data usage

Retention & Deletion:

  • Active accounts: Data retained while you use our service
  • Deleted accounts: Data deleted within 30 days
  • Backups: Purged within 90 days of deletion
  • Legal holds: Retained only as required by law

Secure Deletion:

  • Multi-pass data wiping for sensitive data
  • Cryptographic erasure for encrypted data
  • Verification of deletion completion
  • Certificate of deletion available upon request

3. Infrastructure Security

3.1 Cloud Infrastructure

Amazon Web Services (AWS):

We leverage AWS’s world-class infrastructure:

  • Certifications: ISO 27001, SOC 1/2/3, PCI DSS Level 1
  • Physical security: Biometric access, 24/7 surveillance, armed guards
  • Environmental controls: Fire suppression, climate control, redundant power
  • Compliance: Multiple regulatory frameworks (HIPAA, FedRAMP, etc.)

Availability & Reliability:

  • Multiple availability zones for redundancy
  • Automatic failover capabilities
  • 99.9% uptime commitment
  • Geographic distribution of resources

DDoS Protection:

  • AWS Shield Standard (always enabled)
  • Rate limiting and traffic filtering
  • Automated threat detection and mitigation
  • Traffic anomaly analysis

3.2 Network Security

Virtual Private Cloud (VPC):

  • Isolated network environment
  • Private subnets for sensitive resources
  • Network segmentation by function
  • No direct public access to databases

Firewall & Access Control:

  • Network-level firewall (Security Groups)
  • Application-level firewall (WAF)
  • Strict ingress/egress rules
  • IP whitelisting available for enterprise customers

Intrusion Detection & Prevention:

  • Network traffic monitoring
  • Anomaly detection systems
  • Automated threat response
  • Regular security assessments

Secure Architecture:

  • Load balancing for availability
  • Auto-scaling for performance and security
  • Isolated staging and production environments
  • No shared infrastructure between customers

4. Application Security

4.1 Secure Software Development Lifecycle (SSDLC)

Development Practices:

  • Security requirements from day one
  • Threat modeling for new features
  • Secure coding standards and guidelines
  • Peer code reviews for all changes
  • Security-focused pull request reviews

Automated Testing:

  • SAST (Static Application Security Testing): Code analysis before deployment
  • DAST (Dynamic Application Security Testing): Runtime vulnerability scanning
  • Dependency scanning: Third-party library vulnerability checks
  • Container scanning: Docker image security analysis
  • Infrastructure as Code (IaC) scanning: Terraform security validation

CI/CD Security:

  • Security gates in deployment pipeline
  • Automated security tests before production
  • Failed security checks block deployment
  • Audit trail of all deployments

4.2 Runtime Application Protection

Web Application Firewall (WAF):

  • Protection against common attacks (OWASP Top 10)
  • SQL injection prevention
  • Cross-Site Scripting (XSS) protection
  • Rate limiting and bot detection
  • Custom rules for emerging threats

Input Validation & Sanitization:

  • Server-side validation for all input
  • Parameterized queries to prevent SQL injection
  • Output encoding to prevent XSS
  • File upload security (type, size, content validation)
  • API input validation with schema enforcement

Security Headers:

  • Content Security Policy (CSP)
  • HTTP Strict Transport Security (HSTS)
  • X-Frame-Options (clickjacking protection)
  • X-Content-Type-Options
  • Referrer-Policy

API Security:

  • Rate limiting per user and endpoint
  • Authentication required for all endpoints
  • API versioning for security updates
  • Request/response validation
  • Detailed API logging and monitoring

4.3 Authentication & Authorization

Multi-Factor Authentication (MFA):

  • TOTP (Time-based One-Time Password) support
  • SMS and email-based verification
  • MFA required for administrative access
  • MFA recommended for all users
  • Recovery codes for account recovery

Strong Password Requirements:

  • Minimum length: 12 characters
  • Complexity requirements (uppercase, lowercase, numbers, symbols)
  • Password strength meter
  • Common password blacklist (no “password123”)
  • Regular password breach database checks

Role-Based Access Control (RBAC):

  • Granular permissions system
  • Workspace-level and project-level roles
  • Principle of least privilege
  • Custom role creation for enterprises
  • Audit logs for all permission changes

Session Management:

  • Secure session token generation
  • HttpOnly and Secure cookie flags
  • Session timeout after inactivity (configurable)
  • Single sign-out (invalidate all sessions)
  • Device tracking and management

Single Sign-On (SSO) Support:

  • SAML 2.0 for enterprise customers
  • OAuth 2.0 / OpenID Connect
  • Integration with popular identity providers (Google, Microsoft, Okta)
  • Just-in-Time (JIT) provisioning

5. Access Controls

5.1 Principle of Least Privilege

Minimal Access:

  • Users granted only necessary permissions
  • Role-based access assignment
  • Time-limited access for temporary needs
  • Regular access reviews and recertification

Administrative Access:

  • Strictly controlled and monitored
  • MFA required for all admin actions
  • Just-in-time access provisioning
  • Approval workflow for elevated privileges
  • Automatic expiration of temporary access

5.2 Employee Access & Security

Hiring & Onboarding:

  • Background checks for employees with data access (where legally permitted)
  • Confidentiality and Non-Disclosure Agreements (NDAs)
  • Security awareness training during onboarding
  • Policy acknowledgment and acceptance

Security Training:

  • Annual security awareness training for all employees
  • Role-specific security training (developers, support, etc.)
  • Phishing simulations and education
  • Incident response training
  • Regular security updates and communications

Access Management:

  • Unique credentials for each employee (no shared accounts)
  • MFA required for all corporate access
  • Regular access reviews (quarterly)
  • Immediate revocation upon termination
  • Offboarding checklist for departing employees

Device Security:

  • Company-issued laptops with full disk encryption
  • Endpoint protection (antivirus, anti-malware)
  • Mobile device management (MDM) for mobile access
  • Screen lock and auto-logout policies
  • Lost/stolen device remote wipe capability

6. Monitoring & Incident Detection

6.1 24/7 Security Monitoring

Real-Time Monitoring:

  • Continuous monitoring of infrastructure and applications
  • Automated alerting for suspicious activity
  • Security Operations Center (SOC) monitoring
  • Incident escalation procedures

Threat Detection:

  • Anomaly detection using machine learning
  • Behavioral analysis for unusual patterns
  • Failed login attempt tracking
  • Brute force attack detection
  • API abuse and rate limit violations

Alerting Systems:

  • Multi-channel alerts (email, SMS, Slack, PagerDuty)
  • Severity-based alert routing
  • On-call rotation for critical alerts
  • Escalation procedures for unacknowledged alerts

6.2 Logging & Audit Trails

Comprehensive Logging:

  • All authentication attempts (success and failure)
  • All data access and modifications
  • Administrative actions
  • API requests and responses
  • System events and errors

Centralized Log Management:

  • Secure log aggregation
  • Log retention: minimum 90 days for security logs
  • Immutable audit logs (tamper-evident)
  • Encrypted log storage
  • Regular log review and analysis

Audit Capabilities:

  • User activity reports
  • Admin action history
  • Data access logs
  • Export capabilities for compliance audits
  • Real-time audit trail access

7. Compliance & Certifications

7.1 Regulatory Compliance

GDPR & Data Protection:

  • EU GDPR compliant
  • UK GDPR (Data Protection Act 2018) compliant
  • Data Processing Agreement available: View DPA
  • Privacy Policy: View Policy
  • Cookie Policy: View Policy

Privacy by Design:

  • Privacy Impact Assessments (PIAs) for new features
  • Data Protection Officer (DPO) appointed
  • Regular privacy reviews
  • User rights management (access, deletion, portability)

7.2 Security Certifications & Standards

Current Certification Status:

Compliant & Operational:

  • GDPR and UK GDPR
  • Data Protection regulations
  • AWS best practices
  • OWASP Top 10 guidance

🔄 In Progress:

  • SOC 2 Type II certification (expected: Q2 2026)
  • ISO 27001 certification (expected: Q3 2026)

Standards Alignment:

  • SOC 2 Trust Services Criteria (Security, Availability, Confidentiality)
  • ISO 27001 Information Security Management
  • NIST Cybersecurity Framework
  • CIS Controls for effective cyber defense
  • OWASP Application Security Verification Standard (ASVS)

7.3 Security Testing & Assessments

Annual Penetration Testing:

  • Independent third-party security firm
  • Black-box and white-box testing
  • Comprehensive assessment of infrastructure and applications
  • Remediation of findings before next test

Quarterly Vulnerability Scanning:

  • Automated vulnerability scans
  • Network and application scanning
  • Prioritized remediation by severity
  • Verification scanning after fixes

Continuous Security Assessment:

  • Internal security audits
  • Code security reviews
  • Architecture security reviews
  • Threat modeling for new features
  • Security metrics and KPIs tracking

8. Incident Response

8.1 Incident Response Program

Preparedness:

  • Documented Incident Response Plan (IRP)
  • Dedicated incident response team
  • Defined roles and responsibilities
  • Regular tabletop exercises and simulations
  • Communication templates and protocols

Incident Classification:

  • P0 (Critical): Data breach, service outage affecting all users
  • P1 (High): Security vulnerability, service degradation
  • P2 (Medium): Limited impact, non-critical issues
  • P3 (Low): Informational, no immediate impact

8.2 Response Process

1. Detection & Reporting:

  • Automated detection systems
  • Employee reporting channels
  • Customer reporting (security@heybondi.com)
  • Security researcher reports

2. Triage & Assessment:

  • Incident classification and severity assignment
  • Impact assessment (users affected, data involved)
  • Threat analysis
  • Activation of incident response team

3. Containment:

  • Immediate actions to stop the incident
  • Isolation of affected systems
  • Prevention of further damage
  • Evidence preservation for forensics

4. Investigation:

  • Root cause analysis
  • Forensic investigation
  • Scope determination
  • Timeline reconstruction

5. Notification:

  • GDPR compliance: Notification within 72 hours if required
  • Customer notification as appropriate
  • Regulatory authority notification as required
  • Transparent communication about impact and remediation

6. Remediation & Recovery:

  • Fix the root cause
  • Apply security patches
  • Restore services to normal operation
  • Verify fix effectiveness

7. Post-Incident Review:

  • Lessons learned session
  • Documentation of incident
  • Process improvements
  • Security enhancements
  • Update incident response plan

8.3 Communication & Transparency

Customer Communication:

  • Timely notification of incidents affecting customers
  • Regular status updates during incident response
  • Post-incident summary and root cause analysis
  • Clear explanation of impact and remediation

Status Page:

  • Real-time service status: status.heybondi.com
  • Incident history and resolution times
  • Scheduled maintenance notifications
  • Subscribe for updates

9. Business Continuity & Disaster Recovery

9.1 Data Backup Strategy

Automated Backups:

  • Daily automated backups of all customer data
  • Continuous replication for critical databases
  • Point-in-time recovery capability
  • Backup integrity verification

Encrypted Backup Storage:

  • AES-256 encryption for all backups
  • Separate encryption keys from production
  • Secure key management
  • Access controls for backup systems

Geo-Redundant Storage:

  • Backups stored in multiple AWS regions
  • Within EU for EU customer data
  • Cross-region replication
  • Protection against regional failures

Regular Restore Testing:

  • Monthly backup restoration tests
  • Verification of data integrity
  • Measurement of recovery time
  • Documentation of restore procedures

9.2 Disaster Recovery

Business Continuity Plan (BCP):

  • Documented procedures for various disaster scenarios
  • Critical business functions identified
  • Recovery priorities established
  • Regular plan reviews and updates

Recovery Objectives:

  • Recovery Time Objective (RTO): Target time to restore services
    • Critical systems: 4 hours
    • Standard systems: 24 hours
  • Recovery Point Objective (RPO): Maximum data loss acceptable
    • Critical data: 1 hour
    • Standard data: 24 hours

Failover Procedures:

  • Automated failover for critical systems
  • Multi-availability zone architecture
  • Database replication and failover
  • Regular disaster recovery drills

Testing & Validation:

  • Annual full disaster recovery test
  • Quarterly partial DR tests
  • Documentation of test results
  • Continuous improvement of DR procedures

10. Responsible Disclosure & Resources

10.1 Security Vulnerability Disclosure

Report Security Issues:

We welcome responsible disclosure of security vulnerabilities:

Bug Bounty Program:

  • Recognition-only program (no monetary rewards currently)
  • Security Researcher Hall of Fame
  • Public acknowledgment with permission
  • Swag and appreciation for significant findings

Safe Harbor:

  • Legal protection for good-faith security research
  • No legal action for researchers following our policy
  • CFAA and DMCA safe harbor provisions

10.2 Customer Security Best Practices

Account Security:

  • Enable Multi-Factor Authentication (MFA) on all accounts
  • ✅ Use strong, unique passwords (12+ characters)
  • ✅ Never share your login credentials
  • ✅ Review connected devices and sessions regularly
  • ✅ Log out when using shared or public devices

Team Management:

  • ✅ Grant minimum necessary permissions
  • ✅ Regularly review user access and roles
  • ✅ Remove access for departing team members immediately
  • ✅ Use SSO for centralized access management
  • ✅ Monitor audit logs for suspicious activity

Data Protection:

  • ✅ Educate your team about phishing and social engineering
  • ✅ Be cautious of suspicious emails or links
  • ✅ Regularly export and backup your data
  • ✅ Use our API securely (keep API keys confidential)
  • ✅ Report suspected security issues immediately

Security Settings:

  • Access security settings in your account dashboard
  • Configure session timeout preferences
  • Set up trusted IP addresses (Enterprise)
  • Enable login notifications
  • Review security activity logs

10.3 Security Resources

Documentation:

Certifications & Audits:

  • SOC 2 reports available upon request (NDA required)
  • AWS compliance documentation
  • Third-party penetration test summaries (NDA required)
  • Security questionnaire responses for enterprise customers

Contact Security Team:

Response Times:

  • Security inquiries: 2-3 business days
  • Vulnerability reports: 48-72 hours
  • Critical incidents: Immediate (24/7 monitoring)

11. Our Security Roadmap

Ongoing Initiatives

Short Term (Next 3-6 Months):

  • Enhanced logging and monitoring capabilities
  • Additional security automation
  • Expanded security training program
  • Customer security education resources

Medium Term (6-12 Months):

  • SOC 2 Type II certification completion
  • ISO 27001 certification preparation
  • Bug bounty program with monetary rewards
  • Advanced threat detection capabilities

Long Term (12+ Months):

  • Additional compliance certifications (ISO 27701, ISO 27017)
  • Enhanced customer security controls
  • Security API for enterprise customers
  • Real-time security dashboard for customers

Continuous Improvement

Security is never “done”-it’s an ongoing commitment:

  • Regular security assessments and updates
  • Adaptation to emerging threats
  • Implementation of new security technologies
  • Response to customer feedback and requirements
  • Industry best practices adoption

12. Questions & Support

Frequently Asked Questions

Q: Where is my data stored? A: EU customer data is stored in AWS data centers in Frankfurt (Germany) or Dublin (Ireland). Your data does not leave the EU.

Q: Do you have SOC 2 or ISO 27001? A: We are currently working towards SOC 2 Type II (expected Q2 2026) and ISO 27001 (expected Q3 2026). We follow best practices aligned with these standards.

Q: Can I get a copy of your security documentation? A: Yes. SOC 2 reports and penetration test summaries are available to customers under NDA. Contact sales@heybondi.com.

Q: How do I enable MFA for my team? A: Go to Account Settings → Security and follow the MFA setup wizard. We recommend requiring MFA for all team members.

Q: What happens if there’s a security incident? A: We will notify affected customers within 72 hours (GDPR requirement), provide regular updates, and share a post-incident report.

Q: Do you encrypt data at rest? A: Yes, all data is encrypted at rest using AES-256 encryption through AWS-managed encryption.

Q: Can I export my data? A: Yes, you can export your data at any time through the platform or by contacting support@heybondi.com.

Contact Our Security Team

For any security-related questions or concerns:

Email: security@heybondi.com
Address: 2803 Philadelphia Pike, Suite B #356, Claymont, DE 19703, United States

We take all security inquiries seriously and respond promptly to help ensure your data is protected.


Thank you for trusting Bondi with your business data. Security is a shared responsibility, and we’re committed to protecting your information every step of the way.

Last reviewed and updated: November 2025