Security and Privacy at Bound
Governance
Bound's Security and Privacy team establishes policies and controls, monitors compliance with those controls, and proves our security and compliance to third-party auditors.
At Bound, we believe...
Access should be restricted to individuals with a legitimate business necessity, following the principle of least privilege to minimize risk.
Security controls should be layered strategically, adhering to the defense-in-depth approach to ensure multiple levels of protection.
Security measures must be uniformly enforced across the entire organization to maintain consistency and reduce vulnerabilities.
The deployment of security controls should be an iterative process, continuously evolving to enhance effectiveness, auditability, and operational efficiency while minimizing friction.
Security and Compliance
System Organization Controls (SOC) reports
Bound maintains a SOC 2 Type I attestation. Our SOC 2 Type I report is available on our Trust Center. Bound also maintains PCI compliance through the PCI-SAQ process.


PCI Compliance
Bound is PCI compliant through the PCI-SAQ A process.
The PCI-SAQ A process is the payment card industry standard for merchants who outsource all cardholder data functions to PCI DSS compliant third parties.
All Bound cardholder data functions are processed through Stripe, our processing partner. A PCI-certified auditor evaluated Stripe and certified it to PCI Service Provider Level 1. This is the most stringent level of certification available in the payments industry. This audit includes both Stripe's Card Data Vault (CDV) and the secure software development of their integration code.
Data Protection
Data at Rest
All datastores with customer data, in addition to S3 buckets, are encrypted at rest. This means the data is encrypted even before it hits the database so that neither physical access, nor logical access to the database, is enough to read the most sensitive information.
Data in Transit
Bound uses TLS 1.2 or higher everywhere data is transmitted over potentially insecure networks. We also use features such as HSTS (HTTP Strict Transport Security) to maximize the security of our data in transit. Server TLS keys and certificates are managed by AWS and deployed via Application Load Balancers.
Data Privacy
At Bound, data privacy is a first-class priority—we strive to be trustworthy stewards of all sensitive data.
Regulatory Compliance
Bound evaluates updates to regulatory and emerging frameworks continuously to evolve our program.
