Skip to content
BoundSecurityLogoBlue

Security and Privacy at Bound

Governance

Bound's Security and Privacy team establishes policies and controls, monitors compliance with those controls, and proves our security and compliance to third-party auditors.

At Bound, we believe...

Bound Website Icon Squares (62)

Access should be restricted to individuals with a legitimate business necessity, following the principle of least privilege to minimize risk.

Bound Website Icon Squares (63)

Security controls should be layered strategically, adhering to the defense-in-depth approach to ensure multiple levels of protection.

Bound Website Icon Squares (64)

Security measures must be uniformly enforced across the entire organization to maintain consistency and reduce vulnerabilities.

Bound Website Icon Squares (65)

The deployment of security controls should be an iterative process, continuously evolving to enhance effectiveness, auditability, and operational efficiency while minimizing friction.

Security and Compliance

System Organization Controls (SOC) reports

 

Bound maintains a SOC 2 Type I attestation. Our SOC 2 Type I report is available on our Trust Center. Bound also maintains PCI compliance through the PCI-SAQ process.

 

AICPA official logoCL SOC 2 Type 1

 

PCI Compliance

Bound is PCI compliant through the PCI-SAQ A process.

The PCI-SAQ A process is the payment card industry standard for merchants who outsource all cardholder data functions to PCI DSS compliant third parties.

All Bound cardholder data functions are processed through Stripe, our processing partner. A PCI-certified auditor evaluated Stripe and certified it to PCI Service Provider Level 1. This is the most stringent level of certification available in the payments industry. This audit includes both Stripe's Card Data Vault (CDV) and the secure software development of their integration code.

Data Protection

Bound Website Icon Squares (66)

Data at Rest

All datastores with customer data, in addition to S3 buckets, are encrypted at rest. This means the data is encrypted even before it hits the database so that neither physical access, nor logical access to the database, is enough to read the most sensitive information.

Bound Website Icon Squares (67)

Data in Transit

Bound uses TLS 1.2 or higher everywhere data is transmitted over potentially insecure networks. We also use features such as HSTS (HTTP Strict Transport Security) to maximize the security of our data in transit. Server TLS keys and certificates are managed by AWS and deployed via Application Load Balancers.

Data Privacy

At Bound, data privacy is a first-class priority—we strive to be trustworthy stewards of all sensitive data.

Bound Website Icon Squares (71)

Regulatory Compliance

Bound evaluates updates to regulatory and emerging frameworks continuously to evolve our program.