Legal
Security Overview
Our security practices and infrastructure
Last updated: December 2025
Introduction
Security is fundamental to BotSigged. As a service that helps protect websites from automated threats, we hold ourselves to high security standards. This document provides an overview of our security practices.
Infrastructure Security
Hosting
- Hosted on enterprise-grade cloud infrastructure
- Geographically distributed for redundancy
- Automatic scaling to handle traffic spikes
- Regular infrastructure updates and patching
Network Security
- All traffic encrypted with TLS 1.2+
- Web Application Firewall (WAF) protection
- DDoS mitigation
- Network segmentation between services
Access Control
- Role-based access control (RBAC)
- Multi-factor authentication required for all team access
- Principle of least privilege
- Regular access reviews
Application Security
Secure Development
- Security-focused code reviews
- Static analysis and dependency scanning
- No secrets in code repositories
- Regular dependency updates
Data Protection
- Encryption at rest using AES-256
- Encryption in transit using TLS
- Secure key management
- Data minimization practices
Authentication
- Passwords hashed using bcrypt
- Session tokens with secure expiration
- CSRF protection on all forms
- Rate limiting on authentication endpoints
Operational Security
Monitoring
- 24/7 infrastructure monitoring
- Anomaly detection for unusual patterns
- Centralized logging
- Alert escalation procedures
Incident Response
- Documented incident response plan
- Designated security response team
- Post-incident review process
- Customer notification procedures
Business Continuity
- Regular automated backups
- Tested disaster recovery procedures
- Geographic redundancy
- Documented recovery time objectives
SDK Security
Client-Side Security
- No sensitive data stored client-side
- Session identifiers are randomly generated
- SDK does not access or transmit form field values
- Cross-origin protections
Data Minimization
The SDK collects only what’s necessary for bot detection:
- Behavioral patterns (not content)
- Technical fingerprints (not personal identifiers)
- Timing data (not keystrokes or input values)
Compliance
Privacy Regulations
- GDPR-compliant data processing
- Data Processing Agreement available
- Support for data subject requests
- Privacy by design principles
Security Standards
- Regular security assessments
- Penetration testing
- Vulnerability disclosure program
Vulnerability Disclosure
If you discover a security vulnerability, please report it responsibly:
- Email: [email protected]
- Do not publicly disclose until we’ve addressed the issue
- We commit to acknowledging reports within 48 hours
Questions
For security-related inquiries: [email protected]