We prioritize security and privacy.

Earning and maintaining our customers' trust is our priority, and has continually guided our efforts. Since our inception, we have invested heavily in policies and controls, technical security, and a culture of vigilance.

Compliance and Certifications

We hold ourselves to our own high standards, as well as those established by the industry. Our completion of a SOC 2 Type II audit indicates that our processes, procedures and controls have been formally evaluated and tested by an independent accounting and auditing firm. We are proud of the groundwork we've laid in place well in advance of our product launch, and the recognition of these efforts.

SOC 2 (Type II)

CSA Star Self-Assessment

Infrastructure and processes that go above and beyond.

Secure Access Controls

Exclusive Google SSO for user account access, SAML-based SSO, two-factor authentication, and policy-based access for internal controls.

3rd Party Audits

We do regular external audits to validate our internal security process.

Encryption at Rest and Transit

All data is encrypted at application level using AES-256 GCM encryption, and served over secure connections to customers.

Penetration Testing

We commision independent audits to augment our internal audits on a regular basis.

End-user Auditable Logs

Comprehensive and auditable logs of key activities.

Customized Agreements

Business Associate Agreements (BAAs) or custom T&Cs as needed.

Security & Compliance Guides

More security questions?

If you have any specific questions, want to see our SOC 2 Type II report (under NDA), or have any suggestions, just send a note to security@blissfully.com.