Security & Compliance

How we protect your data and maintain security

Security Overview

At Sleam, security is fundamental to everything we do. We implement professional-grade security measures to protect your cloud cost data and ensure compliance with industry standards.

SOC 2 Type II
GDPR Compliant
ISO 27001
PCI DSS

Data Encryption

Encryption in Transit

  • All data transmission uses TLS 1.2 or higher encryption
  • API communications secured with HTTPS
  • Database connections encrypted end-to-end
  • Slack integration uses secure OAuth 2.0 flows

Encryption at Rest

  • AES-256 encryption for all stored data
  • Encrypted database storage with managed services
  • Secure key management using industry standards
  • Regular key rotation policies

Cloud Provider Integration Security

Read-Only Access Model

  • Sleam only requests read-only permissions to your cloud accounts
  • No ability to modify, create, or delete cloud resources
  • Cross-account roles with least privilege principle
  • External validation for additional security

Access Control Best Practices

  • Minimal required permissions for cost analysis
  • Time-limited access tokens
  • Regular audit of permissions and access logs
  • Customer-controlled revocation at any time

Required Cloud Permissions

Read-only access to:
• Cost and billing APIs
• Usage metrics and dimensions
• Optimization recommendations
• Resource configuration data
• Infrastructure stack information

Infrastructure Security

Cloud Infrastructure

  • Hosted on professional-grade cloud infrastructure
  • Multi-zone deployment for high availability
  • Network isolation and segmentation
  • Web Application Firewall (WAF) protection
  • DDoS protection and traffic filtering

Access Controls

  • Multi-factor authentication for all admin access
  • Role-based access control (RBAC)
  • Principle of least privilege
  • Regular access reviews and deprovisioning

Monitoring & Logging

  • 24/7 security monitoring and alerting
  • Comprehensive audit logging
  • Intrusion detection systems
  • Automated threat response

Application Security

Secure Development

  • Security-first development lifecycle
  • Regular static and dynamic code analysis
  • Dependency vulnerability scanning
  • Secure coding practices and training

Authentication & Authorization

  • OAuth 2.0 integration with Slack
  • JWT tokens with expiration
  • Session management and timeout controls
  • API rate limiting and throttling

Data Validation

  • Input validation and sanitization
  • SQL injection prevention
  • Cross-site scripting (XSS) protection
  • API parameter validation

Compliance & Certifications

Privacy Regulations

  • GDPR: Full compliance with EU data protection regulations
  • CCPA: California Consumer Privacy Act compliance
  • PIPEDA: Personal Information Protection in Canada

Security Frameworks

  • SOC 2 Type II: Annual third-party security audits
  • ISO 27001: Information security management
  • NIST Framework: Cybersecurity best practices

Payment Security

  • PCI DSS: Handled by Paddle.com (merchant of record)
  • No storage of payment card information
  • Secure payment processing workflows

Incident Response

Response Team

  • Dedicated security incident response team
  • 24/7 monitoring and alerting
  • Escalation procedures and communication plans
  • Post-incident analysis and improvement

Customer Notification

  • Timely notification of security incidents
  • Transparent communication about impact
  • Regular updates during incident resolution
  • Post-incident summary reports

Data Backup & Recovery

Backup Strategy

  • Automated daily backups of all critical data
  • Cross-region backup replication
  • Point-in-time recovery capabilities
  • Regular backup integrity testing

Disaster Recovery

  • Recovery Time Objective (RTO): < 4 hours
  • Recovery Point Objective (RPO): < 1 hour
  • Multi-region failover capabilities
  • Regular disaster recovery testing

Vendor Security

Third-Party Assessments

  • Security assessments of all vendors
  • Regular vendor security reviews
  • Contractual security requirements
  • Data processing agreements (DPAs)

Key Partners

  • Cloud Infrastructure: SOC 1/2/3, ISO 27001, FedRAMP
  • Slack: SOC 2, ISO 27001, CSA STAR
  • Paddle: PCI DSS Level 1, SOC 2

Security Best Practices for Users

Account Security

  • Enable two-factor authentication on your Slack account
  • Use strong, unique passwords
  • Regularly review connected applications
  • Promptly report suspicious activity

Cloud Security

  • Use least privilege access policies
  • Regularly review and rotate access credentials
  • Enable comprehensive audit logging
  • Monitor access usage and permissions

Contact Security Team

For security questions, vulnerability reports, or incident reports:
Email: contact@sleam.io
Bug Bounty: contact@sleam.io
Emergency: Available 24/7 via contact@sleam.io

Responsible Disclosure: We appreciate security researchers who report vulnerabilities responsibly. Please email contact@sleam.io with details.