Your data is encrypted at rest and protected by TLS in transit. Your Segment password is hashed using bcrypt, and we manage our production secrets with AWS tools.
Our projects pass thorough security-design reviews, threat models, and regular pen tests using trusted security vendors. We also employ a public bug bounty for continuous assessment.
We systematically limit internal access to critical tools and resources using time-based access.
For more details on security at Segment, download our Security Overview.
Centrally manage your policies for access with Single Sign-On (SSO) on the Business plan.
Control access to your Sources and Workspaces with fine-grained permissions to manage how your users interact with your data.
SCIM allows your Identity Provider (IdP) to manage users and group membership within the Segment application.
When choosing a new password, we provide visual guidance to help customers pick strong passwords that have not been exposed in security breaches on other websites.
MFA provides an additional layer of security beyond your username and password. When logging into Segment, you’ll also enter a code from your mobile phone.
Since August of 2017, Segment has run a bug bounty program on the Bugcrowd platform. This program has provided tremendous value, and has improved security for both Segment and our customers. We consider our bug bounty program one of the best investments for finding and fixing existing vulnerabilities in our applications and internet-facing assets. We’ve also built productive relationships with security researchers and see some as an extension of our team. If you’ve found a vulnerability, please read the rules of our bounty brief and submit here.
SOC 2 Type 2
Our Data Processing Agreement (DPA) reflects the requirements of the GDPR.
We offer Standard Contractual Clauses for compliant user data transfer and storage outside of the EU.
Your data is yours to own. Segment does not sell our customers' user data.
Segment has appointed a Data Protection Officer to oversee our ongoing compliance efforts.
“Any experienced security practitioner can tell you that technology and processes are just two key components of an effective security program. People are the third component. At Segment, security is everyone’s responsibility.”
CISO at Twilio Segment