Security

We take the security of your data seriously. Learn about the measures we take to protect your information and templates.

Encryption

All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption.

No Credential Storage

We never store your AWS credentials. We use IAM role assumption for secure, temporary access.

Secure Infrastructure

Hosted on AWS with multiple layers of security, network isolation, and DDoS protection.

Access Controls

Role-based access control ensures team members only access what they need.

Data Protection

Encryption

  • All network traffic is encrypted using TLS 1.3
  • Database encryption at rest using AES-256
  • Encryption keys are managed using industry-standard key management
  • Regular key rotation policies

AWS Integration Security

  • We use IAM role assumption so your AWS credentials are never stored
  • External IDs prevent confused deputy attacks
  • Minimal permissions: we only request access to SES template operations
  • You maintain full control and can revoke access at any time

Application Security

Authentication

  • Secure password hashing using bcrypt
  • Session management with secure, HTTP-only cookies
  • Protection against brute force attacks

Authorization

  • Role-based access control (RBAC) for team management
  • Activity logging for audit trails

Infrastructure Security

Hosting

  • Hosted on AWS cloud infrastructure
  • Network isolation and firewalls
  • DDoS protection
  • Regular security patches and updates

Monitoring

  • 24/7 infrastructure monitoring
  • Automated threat detection
  • Incident response procedures

Responsible Disclosure

We appreciate the security research community's efforts in helping keep our users safe. If you discover a security vulnerability, please report it responsibly through our contact page.

  • Please provide detailed information about the vulnerability
  • Allow reasonable time for us to address the issue before public disclosure

Have security questions?

If you have questions about our security practices, we're happy to help.

Contact us