1. Security Overview
At SalesTub, security isn't an afterthought—it's foundational to everything we build. We employ multiple layers of security controls to protect your data against unauthorized access, disclosure, alteration, and destruction.
Encryption
All data encrypted in transit (TLS 1.3) and at rest (AES-256)
Secure Infrastructure
SOC 2 Type II certified cloud with redundancy
Access Controls
RBAC, MFA, and SSO integration options
Compliance
IT Act 2000, GDPR principles compliant
Team Security
Background checks and security training
Incident Response
24/7 monitoring and rapid response
2. Data Encryption
2.1 Encryption in Transit
All data transmitted between your browser and our servers is encrypted using TLS 1.3, the latest and most secure encryption protocol available. This ensures that your data cannot be intercepted or read by unauthorized parties during transmission.
- TLS 1.3 with perfect forward secrecy
- HSTS (HTTP Strict Transport Security) enabled
- Certificate transparency logging
- Automatic certificate renewal
2.2 Encryption at Rest
Data stored in our databases is encrypted using AES-256 encryption, the gold standard for data protection used by governments and financial institutions worldwide.
- AES-256 encryption for all stored data
- Separate encryption keys per organization
- Secure key management with regular rotation
- Encrypted database backups
3. Infrastructure Security
Cloud Infrastructure
Hosted on Google Cloud Platform (GCP) and Amazon Web Services (AWS) with SOC 2 Type II certification, ensuring enterprise-grade security and reliability.
3.1 Network Security
- Virtual Private Cloud (VPC) isolation
- Web Application Firewall (WAF) protection
- DDoS protection and mitigation
- Network segmentation and micro-segmentation
- Intrusion detection and prevention systems (IDS/IPS)
3.2 Physical Security
Our cloud providers maintain world-class physical security at their data centers:
- 24/7 security personnel and surveillance
- Biometric access controls
- Environmental controls (fire suppression, climate control)
- Redundant power and networking
4. Access Control
4.1 User Authentication
- Multi-Factor Authentication (MFA): Optional but recommended for all accounts
- Single Sign-On (SSO): Integration with Google, Microsoft, Okta, and SAML providers
- Password Policies: Enforced complexity requirements and breach detection
- Session Management: Automatic timeout and concurrent session controls
4.2 Role-Based Access Control (RBAC)
Fine-grained permissions ensure users only access what they need:
- Predefined roles: Admin, Manager, Sales Rep, Read-Only
- Custom role creation with granular permissions
- Field-level security for sensitive data
- Audit logs for all access and changes
4.3 Internal Access
SalesTub employees follow strict access protocols:
- Principle of least privilege
- Background checks for all employees
- Mandatory security training
- Access requires explicit authorization and is logged
- Regular access reviews and revocation
5. Compliance & Certifications
Independently audited security controls
Information security management
EU data protection compliance
Indian data protection compliance
5.1 Regulatory Compliance
- GDPR: Data protection for EU residents
- IT Act 2000: Indian data protection requirements
- CCPA: California consumer privacy compliance
- HIPAA: Healthcare data handling (Enterprise plans)
6. Security Practices
We follow industry-leading security practices to continuously improve our security posture:
6.1 Secure Development
- Secure coding guidelines and training
- Automated security testing in CI/CD pipeline
- Dependency vulnerability scanning
- Mandatory code review for all changes
7. Backup & Recovery
Data Protection
6 hrs
Backup Frequency
30 days
Retention Period
<4 hrs
Recovery Time
- Automated backups every 6 hours
- Point-in-time recovery capability
- Geographically distributed backup storage
- Encrypted backup data
- Regular recovery testing
8. Monitoring & Incident Response
8.1 Continuous Monitoring
- 24/7 security operations center (SOC)
- Real-time threat detection and alerting
- Log aggregation and analysis
- Anomaly detection using machine learning
8.2 Incident Response
We maintain a comprehensive incident response plan:
- Documented incident response procedures
- Trained incident response team
- Customer notification within 72 hours of confirmed breach
- Post-incident analysis and remediation
99.9% Uptime Guarantee
We maintain high availability with redundant systems and automatic failover.
10. Contact Security Team
Our security team is available to answer questions and address concerns:
- General Inquiries: security@salestub.com
- Vulnerability Reports: Report a vulnerability
- Security Documentation: Available upon request for Enterprise customers
Bug Bounty Program
We appreciate security researchers who help us keep SalesTub secure. If you discover a vulnerability, please report it responsibly to security@salestub.com. We acknowledge all valid reports and work quickly to address issues.