Etymology of security
Security, n; from Latin sēcūritās, from Latin sēcūrus (“safe, secure”), from se- (“without”) + cura (“care”).
Security at InfluxData
InfluxDB Cloud security and compliance
We have a team dedicated to our compliance program and are committed to providing our customers with all relevant security documentation to build a foundation of trust in our company and products. InfluxData is SOC 2® Type 2 certified. Our SOC2 report is available upon request.
The ISO/IEC 27001:2013 standard established by the International Organization for Standardization “specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization.”
The ISO/IEC 27018:2019 code of practice created by the International Organization for Standardization “establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.”
The InfluxData security program includes:
- an active bug bounty program
- frequent vulnerability scans
- regular third-party penetration tests
- continuous security management and monitoring
- industry standard encryption
- threat modeling, code review, software composition analysis, and other security development life cycle (SDLC) best practices
Report a vulnerability
Any security concerns or vulnerabilities discovered in one of InfluxData’s products or services can be reported by utilizing one of the methods described in our reporting vulnerabilities page.