Security & Compliance
How we protect your data and maintain security
Security Overview
At Sleam, security is fundamental to everything we do. We implement professional-grade security measures to protect your cloud cost data and ensure compliance with industry standards.
SOC 2 Type II
GDPR Compliant
ISO 27001
PCI DSS
Data Encryption
Encryption in Transit
- All data transmission uses TLS 1.2 or higher encryption
- API communications secured with HTTPS
- Database connections encrypted end-to-end
- Slack integration uses secure OAuth 2.0 flows
Encryption at Rest
- AES-256 encryption for all stored data
- Encrypted database storage with managed services
- Secure key management using industry standards
- Regular key rotation policies
Cloud Provider Integration Security
Read-Only Access Model
- Sleam only requests read-only permissions to your cloud accounts
- No ability to modify, create, or delete cloud resources
- Cross-account roles with least privilege principle
- External validation for additional security
Access Control Best Practices
- Minimal required permissions for cost analysis
- Time-limited access tokens
- Regular audit of permissions and access logs
- Customer-controlled revocation at any time
Required Cloud Permissions
Read-only access to:
• Cost and billing APIs
• Usage metrics and dimensions
• Optimization recommendations
• Resource configuration data
• Infrastructure stack information
Infrastructure Security
Cloud Infrastructure
- Hosted on professional-grade cloud infrastructure
- Multi-zone deployment for high availability
- Network isolation and segmentation
- Web Application Firewall (WAF) protection
- DDoS protection and traffic filtering
Access Controls
- Multi-factor authentication for all admin access
- Role-based access control (RBAC)
- Principle of least privilege
- Regular access reviews and deprovisioning
Monitoring & Logging
- 24/7 security monitoring and alerting
- Comprehensive audit logging
- Intrusion detection systems
- Automated threat response
Application Security
Secure Development
- Security-first development lifecycle
- Regular static and dynamic code analysis
- Dependency vulnerability scanning
- Secure coding practices and training
Authentication & Authorization
- OAuth 2.0 integration with Slack
- JWT tokens with expiration
- Session management and timeout controls
- API rate limiting and throttling
Data Validation
- Input validation and sanitization
- SQL injection prevention
- Cross-site scripting (XSS) protection
- API parameter validation
Compliance & Certifications
Privacy Regulations
- GDPR: Full compliance with EU data protection regulations
- CCPA: California Consumer Privacy Act compliance
- PIPEDA: Personal Information Protection in Canada
Security Frameworks
- SOC 2 Type II: Annual third-party security audits
- ISO 27001: Information security management
- NIST Framework: Cybersecurity best practices
Payment Security
- PCI DSS: Handled by Paddle.com (merchant of record)
- No storage of payment card information
- Secure payment processing workflows
Incident Response
Response Team
- Dedicated security incident response team
- 24/7 monitoring and alerting
- Escalation procedures and communication plans
- Post-incident analysis and improvement
Customer Notification
- Timely notification of security incidents
- Transparent communication about impact
- Regular updates during incident resolution
- Post-incident summary reports
Data Backup & Recovery
Backup Strategy
- Automated daily backups of all critical data
- Cross-region backup replication
- Point-in-time recovery capabilities
- Regular backup integrity testing
Disaster Recovery
- Recovery Time Objective (RTO): < 4 hours
- Recovery Point Objective (RPO): < 1 hour
- Multi-region failover capabilities
- Regular disaster recovery testing
Vendor Security
Third-Party Assessments
- Security assessments of all vendors
- Regular vendor security reviews
- Contractual security requirements
- Data processing agreements (DPAs)
Key Partners
- Cloud Infrastructure: SOC 1/2/3, ISO 27001, FedRAMP
- Slack: SOC 2, ISO 27001, CSA STAR
- Paddle: PCI DSS Level 1, SOC 2
Security Best Practices for Users
Account Security
- Enable two-factor authentication on your Slack account
- Use strong, unique passwords
- Regularly review connected applications
- Promptly report suspicious activity
Cloud Security
- Use least privilege access policies
- Regularly review and rotate access credentials
- Enable comprehensive audit logging
- Monitor access usage and permissions
Contact Security Team
For security questions, vulnerability reports, or incident reports:
Email: contact@sleam.io
Bug Bounty: contact@sleam.io
Emergency: Available 24/7 via contact@sleam.io
Responsible Disclosure: We appreciate security researchers who report vulnerabilities responsibly. Please email contact@sleam.io with details.