Last Update: October 2021 Security Overview
Last Update: October 2021
Security Overview
Table of Contents
Our Company and Products
4
HubSpot Security and Risk Focus
4
Our Security and Risk Management Objectives
4
HubSpot Security Controls
5
HubSpot Product Infrastructure
5
Application Protection
7
Customer Data Protection
9
Data Backup and Disaster Recovery
10
Identity and Access Control
11
Organizational and Corporate Security
14
Incident Management
16
Compliance
17
Privacy
17
GDPR
19
Document Scope and Use
19
2 -- HubSpot Security and Risk Management Overview
HubSpot Security Overview
Our Company and Products
HubSpot is the world's leading inbound marketing, sales, services, content management, and operations platform. Since 2006, HubSpot has been on a mission to make the world more inbound. Today, over 100,000 customers in more than 120 countries use HubSpot's software, services, and support to transform the way they attract, engage, and delight customers. The HubSpot products are offered as Software-as-a-Service (SaaS) solutions. These solutions are available to customers through purpose-built web applications, application programming interfaces (APIs), and email plugins.
HubSpot Security and Risk Focus
HubSpot's primary security focus is to safeguard our customers' data. This is the reason that HubSpot has invested in the appropriate resources and controls to protect and service our customers. This investment includes the implementation of dedicated Corporate Security and Product Security teams. These teams are responsible for HubSpot's comprehensive security program and the governance process. We are focused on defining new and refining existing controls, implementing and managing the HubSpot security framework as well as providing a support structure to facilitate effective risk management. Our Chief Information Security Officer oversees the implementation of security safeguards across HubSpot and its products.
3 -- HubSpot Security and Risk Management Overview
Our Security and Risk Management Objectives
We have developed our security framework using best practices in the SaaS industry. Our key objectives include:
Customer Trust and Protection ? consistently deliver superior product and service to our customers while protecting the privacy and confidentiality of their information.
Availability and Continuity of Service ? ensure ongoing availability of the service and data to all authorized individuals and proactively minimize the security risks threatening service continuity.
Information and Service Integrity ? ensure that customer information is never corrupted or altered inappropriately.
Compliance with Standards ? we design our corporate security program around the industry cybersecurity best practice guidelines including the Center for Internet Security (CIS) Critical Security Controls. Our controls governing the availability, confidentiality, and security of customer data are also designed to be SOC 2 compliant with the Trust Service Principles (TSPs) established by the American Institute of Certified Public Accountants (AICPA).
4 -- HubSpot Security and Risk Management Overview
HubSpot Security Controls
In order to protect the data that is entrusted to us, HubSpot utilizes a defense-in-depth approach to implement layers of security controls throughout our organization. The following sections describe a subset of our most frequently asked about controls.
HubSpot Product Infrastructure
Cloud Infrastructure Security
HubSpot does not host any product systems within its corporate offices. HubSpot outsources hosting of its product infrastructure to leading cloud infrastructure provider, Amazon Web Services (AWS). Our hosting provider guarantees between 99.95% and 100% service availability ensuring redundancy to all power, network, and HVAC services. HubSpot's AWS product infrastructure resides in the US east region or in the Germany region. AWS maintains an audited security program, as well as physical, environmental, and infrastructure security protections. Business continuity and disaster recovery plans have been independently validated as part of their SOC 2 Type 2 and ISO 27001 certifications. Compliance documentation is publicly available at the AWS Cloud Compliance Page. HubSpot also maintains a Knowledge Base (KB) article with frequently asked questions regarding our Cloud Infrastructure: here.
Network Security and Perimeter Protection
The HubSpot product infrastructure enforces multiple layers of filtering and inspection of all connections throughout the platform. Network-level access control lists are implemented to prevent unauthorized network access to our internal product infrastructure. Firewalls are configured to deny network connections that are not explicitly authorized by default, and traffic monitoring is in place for detection of anomalous activity.
5 -- HubSpot Security and Risk Management Overview
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- digital advertising workbook
- the complete guide to setting up hubspot imrg
- die fp sign vorteile im ganzen unternehmen dank single sign on
- a beginner s guide how to use linkedin for business hubspot
- the complete guide to hubspot workflows
- hubspot crm user guide face2facehr partners
- hubspot your data and you
- ringcentral hubspot user guide v1
- epm epayslips single sign on account
- 2022 sustainability report hubspot
Related searches
- social security cola 2021 update
- update social security direct deposit
- social security increase 2021 cola
- download october update windows 10
- last update windows 10
- 2021 social security cola increase
- 2021 01 cumulative update preview
- social security cola for 2021 announcement
- social security disability 2021 increase
- social security 2021 increase updates
- social security 2021 benefits change
- social security checks october 2020