Zyvarin Logo
ZyvarinWrite Once, Publish Everywhere

Security & Compliance Policy

Last updated: December 8, 2025

1. Security Overview

Zyvarin Social is committed to maintaining the highest standards of data security and compliance. We protect your information through multiple layers of technical, administrative, and physical security controls. This policy outlines our security practices, compliance certifications, and incident response procedures.

2. Encryption & Data Protection

2.1 Encryption at Rest

All sensitive data stored in our systems is encrypted using AES-256 encryption:

  • Database Encryption: PostgreSQL with pgcrypto extension
  • Social Media Tokens: Encrypted with master key stored separately
  • Payment Data: Not stored locally; tokenized via Razorpay
  • Backups: Encrypted copies stored in multiple geographic locations
  • File Storage: Encrypted object storage (S3-compatible)

2.2 Encryption in Transit

All data transmitted between your device and our servers is protected:

  • HTTPS/TLS: TLS 1.3 minimum for all connections
  • Certificate Authority: Verified SSL/TLS certificates from trusted CAs
  • HSTS: HTTP Strict Transport Security headers enabled
  • API Endpoints: All API calls require HTTPS
  • Certificate Pinning: Available for mobile apps

2.3 Password Security

  • Hashing: Passwords hashed with bcrypt (cost factor 12)
  • Salting: Unique salt generated per password
  • Reset Tokens: Secure, single-use tokens with expiration
  • Minimum Requirements: 8 characters, mixed case, numbers recommended

3. Authentication & Access Control

3.1 Authentication Methods

  • Email/Password: Secure login with email verification
  • OAuth 2.0: Social media platform authentication
  • API Keys: For developer access with scoped permissions
  • Session Management: NextAuth.js with secure session handling
  • Multi-Factor Authentication (MFA): Optional TOTP-based 2FA

3.2 Access Control

We implement role-based access control (RBAC) with the principle of least privilege:

  • Admin: Full platform access, user management, billing
  • Editor: Create, schedule, and publish posts
  • Viewer: View-only access to analytics and drafts
  • Limited: Specific post or account access only

3.3 Session Security

  • HttpOnly Cookies: Session tokens cannot be accessed by JavaScript
  • Secure Flag: Cookies only transmitted over HTTPS
  • SameSite: Protected against CSRF attacks (SameSite=Lax)
  • Timeout: Sessions expire after 30 days of inactivity
  • Logout: Complete session invalidation on logout

4. Network Security

4.1 Infrastructure Security

  • Hosting: Vercel enterprise-grade infrastructure
  • DDoS Protection: Cloudflare DDoS mitigation
  • Firewall: Web application firewall (WAF) enabled
  • IP Allowlisting: For API access and integrations
  • CDN: Content delivery network for static assets

4.2 API Security

  • Rate Limiting: Prevents brute force attacks and abuse
  • Token Validation: All API calls require valid authentication
  • CORS: Configured to prevent unauthorized cross-origin requests
  • Input Validation: All inputs sanitized to prevent injection attacks
  • Output Encoding: Prevents XSS vulnerabilities

4.3 Zero Trust Architecture

We implement zero-trust security principles:

  • Every request authenticated and authorized
  • Microsegmentation of network components
  • Continuous monitoring and threat detection
  • Assumption of breach - defense in depth

5. Application Security

5.1 Secure Development Practices

  • Code Review: All code reviewed before deployment
  • Static Analysis: Automated code scanning for vulnerabilities
  • Dependency Management: Regular updates to security patches
  • Secret Management: Environment variables, no hardcoded secrets
  • Version Control: Git with branch protection rules

5.2 OWASP Top 10 Prevention

We protect against the OWASP Top 10 vulnerabilities:

  • Injection: Parameterized queries, input validation
  • Broken Authentication: Secure authentication implementation
  • Sensitive Data Exposure: Encryption at rest and in transit
  • XML External Entities: XML parsing restricted
  • Broken Access Control: RBAC and permission checks
  • Security Misconfiguration: Hardened defaults, security headers
  • XSS: Content Security Policy (CSP), output encoding
  • CSRF: Anti-CSRF tokens, SameSite cookies
  • Insecure Deserialization: No untrusted deserialization
  • Using Components with Known Vulnerabilities: Regular updates

5.3 Security Headers

  • Content-Security-Policy (CSP) - Prevents XSS
  • X-Frame-Options - Prevents clickjacking
  • X-Content-Type-Options - Prevents MIME type sniffing
  • Strict-Transport-Security (HSTS) - Enforces HTTPS
  • Referrer-Policy - Limits referrer information
  • Permissions-Policy - Restricts browser APIs

6. Vulnerability Management

6.1 Vulnerability Scanning

  • Monthly automated vulnerability scans
  • Quarterly penetration testing by third parties
  • Continuous dependency scanning with SCA tools
  • Real-time threat intelligence monitoring

6.2 Remediation

  • Critical vulnerabilities: Patched within 24 hours
  • High vulnerabilities: Patched within 7 days
  • Medium vulnerabilities: Patched within 30 days
  • Low vulnerabilities: Patched within 90 days

6.3 Responsible Disclosure

If you discover a security vulnerability, please report it responsibly:

  • Email: security@zyvarin.com
  • PGP Key available for sensitive reports
  • We commit to: Acknowledge within 24 hours, Update within 7 days, Credit discovery (optional)
  • No legal action for responsible disclosure

7. Data Backups & Disaster Recovery

7.1 Backup Strategy

  • Frequency: Hourly database backups
  • Encryption: All backups encrypted with AES-256
  • Geographic Redundancy: Backups in multiple regions
  • Retention: 90-day backup retention policy
  • Testing: Monthly backup restoration tests

7.2 Disaster Recovery Plan (DRP)

  • RTO (Recovery Time Objective): 1 hour
  • RPO (Recovery Point Objective): 15 minutes
  • High Availability: Multi-region deployment
  • Failover: Automatic failover to backup infrastructure
  • Testing: Quarterly disaster recovery drills

7.3 Business Continuity

We maintain a Business Continuity Plan covering:

  • Personnel continuity and cross-training
  • Alternate processing sites and redundant systems
  • Emergency communication procedures
  • Customer notification protocols

8. Compliance Certifications

8.1 SOC 2 Type II

Zyvarin is SOC 2 Type II compliant, validated by independent auditors. This certification covers:

  • Security - System protected against unauthorized access
  • Availability - System available as intended
  • Processing Integrity - System data complete and accurate
  • Confidentiality - System data protected from unauthorized disclosure

Audit Frequency: Annual SOC 2 Type II audits conducted by independent auditors. Report available to customers under NDA.

8.2 GDPR Compliance

  • Data Processing Agreement (DPA) in place
  • Standard Contractual Clauses for international transfers
  • Data Protection Impact Assessment (DPIA) conducted
  • Data Protection Officer (DPO) appointed
  • Data breach notification procedures implemented

8.3 CCPA Compliance

  • Consumer privacy rights respected and implemented
  • Data collection disclosures provided
  • Opt-out mechanisms available
  • No sale or sharing of personal information

8.4 Industry Standards

  • ISO 27001 (Information Security Management) - Roadmap: 2025
  • PCI DSS Compliance - Via Razorpay (payment processor)
  • OAuth 2.0 Certified - Social media integrations

9. Incident Response & Security Events

9.1 Incident Response Team

We have a dedicated incident response team trained to handle security incidents:

  • 24/7 on-call security personnel
  • Incident commander and escalation procedures
  • Forensics and log analysis capabilities
  • Legal and compliance consultation available

9.2 Incident Response Timeline

  • Detection: Real-time monitoring and alerts
  • Response: Immediate investigation initiated
  • Containment: 1-4 hours depending on severity
  • Notification: Customer notification within 24 hours of confirmation
  • Post-Incident: Root cause analysis and preventive measures

9.3 Security Monitoring

  • 24/7 Security Operations Center (SOC) monitoring
  • Intrusion Detection System (IDS) deployed
  • Security Information and Event Management (SIEM) implemented
  • Log aggregation and analysis for threat detection
  • Automated alerting for suspicious activities

10. Physical Security

10.1 Data Center Security

Our data centers (via Vercel) implement multiple physical security controls:

  • Restricted access with biometric authentication
  • Video surveillance and monitoring
  • Environmental controls (temperature, humidity, fire suppression)
  • Redundant power supplies and backup generators
  • Regular security audits and penetration testing

10.2 Office Security

  • Controlled access to office facilities
  • Security badges required for all employees
  • Clean desk policy enforced
  • Secure destruction of sensitive documents
  • Regular security awareness training

11. Employee Security & Training

11.1 Hiring & Screening

  • Background checks for all employees
  • Reference verification
  • Confidentiality agreements signed
  • Security clearance verification where required

11.2 Security Training

  • Annual mandatory security awareness training
  • Data protection and privacy training
  • Incident response training
  • Phishing simulations and awareness
  • Role-specific security training

11.3 Access Control & Privileges

  • Principle of least privilege enforced
  • Role-based access to systems
  • Regular access reviews (quarterly)
  • Immediate revocation upon termination
  • Privileged access management (PAM) system

11.4 Offboarding

  • All system access revoked immediately upon termination
  • Return of equipment and credentials
  • Exit interview including security/confidentiality review
  • Post-employment non-disclosure agreement enforcement

12. Third-Party & Vendor Security

12.1 Vendor Assessment

All third-party vendors and service providers are evaluated for security:

  • Security questionnaire completion
  • Compliance certification review (SOC 2, ISO 27001, etc.)
  • Insurance verification (cyber liability)
  • Data protection agreement execution

12.2 Vendor Monitoring

  • Annual security reviews
  • Incident reporting requirements
  • Right to audit vendor systems
  • Termination procedures and data handling

12.3 Current Vendors

Key security vendors we rely on:

  • Vercel: SOC 2 Type II, ISO 27001 certified hosting
  • Razorpay: PCI-DSS Level 1 payment processing
  • Google Cloud: Multi-layered security for APIs
  • Cloudflare: DDoS protection and WAF services

13. Compliance Audits & Assessments

13.1 Internal Audits

  • Quarterly security audits conducted internally
  • Monthly vulnerability assessments
  • Annual comprehensive risk assessment
  • Documented findings and remediation tracking

13.2 External Audits

  • Annual SOC 2 Type II audit by independent auditor
  • Quarterly penetration testing by third-party firm
  • Annual compliance review (GDPR, CCPA, etc.)
  • Public audit reports available to customers (under NDA)

13.3 Regulatory Compliance

  • GDPR compliance for EU customers
  • CCPA compliance for California residents
  • ePrivacy Directive compliance (UK/EU)
  • State privacy laws compliance (Virginia, Colorado, etc.)

14. Data Protection & Privacy

14.1 Data Classification

Data is classified by sensitivity level:

  • Public: Non-sensitive information (blog posts, public profiles)
  • Internal: Business information (internal documents)
  • Confidential: Private data (passwords, API keys)
  • Restricted: Highly sensitive (payment data, health information)

14.2 Data Minimization

  • Collect only necessary personal data
  • Retention limited to specified periods
  • Regular deletion of unnecessary data
  • No collection of sensitive categories without explicit consent

14.3 Privacy by Design

  • Privacy considered in all system design
  • Default settings favor privacy (opt-in not opt-out)
  • Regular privacy impact assessments
  • Data minimization principles applied throughout

15. Transparency & Accountability

15.1 Documentation

Zyvarin maintains comprehensive security documentation:

  • Information Security Policy
  • Risk Register and Risk Assessment
  • Security Architecture Documentation
  • Incident Response Plan
  • Business Continuity Plan
  • Data Protection Impact Assessments

15.2 Transparency Reports

We publish transparency reports on:

  • Government data requests received
  • Data breach incidents and resolutions
  • Security incidents and impact assessments
  • Annual security audit summaries (non-sensitive portions)

15.3 Accountability Measures

  • Data Protection Officer (DPO) appointment and contact availability
  • Clear ownership and responsibility assignments
  • Performance metrics and KPIs tracked
  • Regular board-level security reporting

16. Insurance & Financial Protection

16.1 Cyber Liability Insurance

  • Comprehensive cyber liability coverage
  • Data breach notification costs covered
  • Regulatory fines and penalties covered (where permitted by law)
  • Incident response and forensics covered
  • Annual coverage limit: $5,000,000+

16.2 Insurance Verification

We can provide proof of insurance coverage upon request. Contact: legal@zyvarin.com

17. Security Contact & Reporting

Report Security Vulnerabilities:

Email: security@zyvarin.com

Response time: Within 24 hours

Data Protection Officer (DPO):

Email: dpo@zyvarin.com

Privacy Questions:

Email: privacy@zyvarin.com

18. Policy Updates & Contact

This Security & Compliance Policy is regularly reviewed and updated. Material changes will be announced with 30 days' notice. Continued use of Zyvarin constitutes acceptance of updates.

Stay in the loop

Get the latest on product updates, tips, and social media insights.

Zyvarin Logo
ZyvarinWrite Once

The smarter way to manage social media. Trusted by 50,000+ teams worldwide.

Product

  • Pricing
  • Compare

Resources

  • Help Center
  • Use Cases

Company

  • About
  • Contact

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Acceptable Use Policy
  • Data Processing Agreement
  • Security & Compliance

© 2025 Zyvarin, Inc. All rights reserved.

TwitterLinkedInGitHubYouTube