Security
Our approach to keeping your data private, secure, and available.
Last updated: October 22, 2025
Overview
Security is a shared responsibility. Social Remix secures the platform; customers are responsible for safe use of the product, including access management, content choices, and publishing destinations.
Data classification and storage
- Customer Content (prompts, assets, outputs) and account data are stored in cloud providers with regional redundancy.
- We avoid collecting sensitive data unless strictly required.
- Backups are encrypted and retained for a limited window to support disaster recovery.
Encryption
- Transport: All traffic uses TLS with modern ciphers.
- At rest: Data is encrypted using provider‑managed keys; secrets are stored in a managed secrets vault.
Access control
- Least‑privilege IAM, role separation, and just‑in‑time access for production operations.
- MFA enforced for administrative accounts; SSO available for enterprise plans.
- Audit logs retained for critical administrative actions.
Secure development and change management
- Peer code review, automated tests, and CI/CD with protected branches.
- Dependency scanning and container/image updates for known CVEs.
- Infrastructure as Code (IaC) with change approvals.
Vulnerability management
- Regular patching cadence for OS, runtimes, and dependencies.
- Third‑party penetration testing at least annually (in progress as we scale) and ad‑hoc as needed.
- We welcome responsible disclosure at security@socialremix.app.
Monitoring and logging
- Centralized logs for infrastructure and application events.
- Alerting for availability and security‑relevant anomalies.
Incident response
- Documented escalation, investigation, and communication procedures.
- Customer notification without undue delay where legally required.
Business continuity and disaster recovery
- Automated backups with periodic restore testing.
- Multi‑AZ deployment patterns where supported.
Subprocessors
We rely on a small set of vetted providers for cloud hosting, analytics, email, and payments. Contracts include confidentiality and security obligations. A current list is available upon request.
Compliance
We align practices with industry frameworks as we scale (e.g., SOC 2 readiness). Data protection terms and DPAs are available for eligible plans.
Contact
Questions about security? Email security@socialremix.app.