Security at FluxBilling
How we protect your data and your customers' data. Security is our foundation.
Encryption
TLS 1.3 in transit, AES-256 at rest
Authentication
MFA, SSO, and role-based access
Infrastructure
Redundant, isolated cloud architecture
Monitoring
24/7 threat detection and response
Infrastructure Security
Our infrastructure is designed with security as a foundational principle:
- Hosted on enterprise-grade cloud infrastructure with SOC 2 Type II certification
- Network isolation with private subnets and strict firewall rules
- DDoS protection and mitigation at multiple layers
- Geographic redundancy across multiple data centers
- Automated daily backups with encrypted off-site storage
- Regular infrastructure patching and updates
Data Encryption
In Transit
All data transmitted to and from FluxBilling is encrypted using TLS 1.3, the latest encryption protocol. We enforce HTTPS across all connections and implement HSTS headers.
At Rest
All data stored in our systems is encrypted using AES-256 encryption. This includes database records, file storage, and backup data.
Key Management
Encryption keys are managed using industry-standard key management practices, with regular rotation and secure storage in dedicated hardware security modules (HSM).
Access Control
Role-Based Access Control (RBAC)
FluxBilling implements fine-grained permissions allowing you to control exactly what each team member can access and modify.
Multi-Factor Authentication (MFA)
We support and encourage MFA for all accounts. Administrators can enforce MFA requirements for their organization.
Session Management
Sessions are securely managed with configurable timeouts, device tracking, and the ability to revoke sessions remotely.
API Security
API access is controlled through secure API keys with customizable permissions and rate limiting to prevent abuse.
Audit Logging
Comprehensive audit logs track all significant actions, including logins, configuration changes, and data access.
Application Security
We follow secure development practices throughout our software development lifecycle:
- Secure coding standards and regular code reviews
- Automated security testing in our CI/CD pipeline
- Dependency scanning for known vulnerabilities
- Regular penetration testing by third-party security firms
- Bug bounty program for responsible disclosure
- OWASP Top 10 vulnerability prevention
Compliance
GDPR
We are fully compliant with the General Data Protection Regulation (GDPR). We provide data processing agreements, support data subject rights, and maintain appropriate technical and organizational measures.
SOC 2 Type II
Our systems and processes are designed to meet SOC 2 Type II requirements for security, availability, and confidentiality.
PCI DSS
Payment processing is handled through PCI DSS compliant payment providers. We never store complete credit card numbers on our servers.
Data Processing Agreements
We provide Data Processing Agreements (DPAs) for customers who require them for their compliance needs.
Incident Response
24/7 Monitoring
Our security team monitors our systems around the clock for suspicious activity, potential threats, and system anomalies.
Response Plan
We maintain a comprehensive incident response plan that includes immediate containment, investigation, remediation, and communication procedures.
Customer Notification
In the event of a security incident that affects your data, we will notify you promptly with details about the incident, its impact, and the steps we are taking.
Post-Incident Analysis
After every incident, we conduct a thorough post-mortem analysis to understand root causes and implement measures to prevent recurrence.
Responsible Disclosure
We value the security research community and welcome responsible disclosure of security vulnerabilities.
How to Report
If you discover a security vulnerability, please report it to our security team via a support ticket. Include a detailed description of the vulnerability and steps to reproduce it.
Our Commitment
We commit to:
- Acknowledge receipt of your report within 24 hours
- Provide regular updates on our progress
- Not take legal action against good-faith security researchers
- Credit researchers who help us improve our security (with permission)
- Work with you to understand and resolve the issue quickly
Scope
Please only test against accounts you own or have explicit permission to test. Do not access or modify other users' data.
Report a Security Issue
Found a vulnerability? We appreciate your help in keeping FluxBilling secure. Please submit a support ticket with details.
Get early access
to FluxBilling
Join hundreds of hosting providers already on the waitlist. Get early access and shape the future of FluxBilling.
Join 60+ hosting providers. No spam, ever.