[go: up one dir, main page]

Chroma Cloud Security

Chroma Cloud is built with security at its core. We use layered controls across people, process, and technology to protect your data and ensure the reliability of our services. Our security program has been independently assessed through a SOC 2 Type II examination, validating the design of our security controls.

Governance and People

We maintain a comprehensive security program overseen by our Information Security Officer who reports directly to executive leadership. Our approach includes:

  • Annual review of our Information Security Policy and related policies including Risk Management, Data Classification, Encryption Management, Change Management, Incident Response, Vendor Risk Management, and Business Continuity
  • Background checks for all employees where permitted by law
  • Annual security awareness training for all team members
  • Regular performance reviews and policy acknowledgments
  • Board of Directors oversight with documented charter
  • Enterprise risk assessments conducted annually with semi-annual review meetings

Platform Architecture and Hosting

Chroma Cloud is designed for security and reliability:

  • Hosted on Amazon Web Services (AWS) across multiple Availability Zones for redundancy
  • Production, staging, and development environments are fully isolated in separate AWS accounts and networks
  • Infrastructure managed as code with peer review and approval requirements
  • Containerized architecture orchestrated with Amazon EKS
  • Network access restricted through code-defined security groups
  • Physical security provided by AWS under a shared responsibility model

Data Protection

Your data security is our priority:

  • All customer data encrypted in transit and at rest using industry-standard cryptography (TLS/SSL, PKI, AES)
  • Key management delegated to AWS services where possible
  • Customer data classified and treated as confidential
  • Documented retention and disposal policies with secure wiping of electronic media
  • Company laptops protected with full-disk encryption
  • Clean-desk standard and password manager requirements

Access Controls

We enforce strict access controls to protect your data:

  • Single sign-on (SSO) with role-based access control enforcing least privilege
  • Multi-factor authentication (MFA) required for all employee production and AWS access
  • Unique user IDs required for all accounts
  • Monthly access reviews with immediate revocation upon termination
  • Remote production access requires VPN and encrypted protocols
  • Sessions auto-disconnect after inactivity
  • Cloud resources configured to deny public access by default

Secure Software Development

Security is built into our development process:

  • Documented Software Development Lifecycle (SDLC) with secure coding practices
  • Segregated development, staging, and production environments
  • All changes require peer review and approval before deployment
  • Infrastructure and configuration managed as code through CI/CD pipelines
  • Build artifacts and container images scanned for vulnerabilities
  • Emergency changes follow defined procedures with post-incident review
  • Temporary production access follows a documented “break-glass” process

Monitoring and Threat Detection

We continuously monitor for security threats:

  • Comprehensive logging across infrastructure, applications, and databases
  • Real-time security monitoring with alerts to on-call engineers
  • Intrusion detection and data exfiltration monitoring
  • AWS GuardDuty and AWS Inspector for continuous threat detection
  • Third-party observability tools for performance and security monitoring
  • Log retention according to documented policies

Vulnerability Management

We proactively identify and remediate security vulnerabilities:

  • Continuous internal and external vulnerability scanning in production
  • Annual third-party penetration testing
  • Remediation tracked by severity with defined timelines
  • Critical patches targeted within one month of release
  • Company devices run antimalware with automatic security updates

Incident Response

We're prepared to respond quickly to security incidents:

  • Documented incident response plan covering all phases from detection to recovery
  • Incidents tracked and escalated through PagerDuty
  • Annual testing of incident response procedures
  • Customer notification for incidents affecting customer data
  • Post-incident reviews to improve our response

Business Continuity and Disaster Recovery

We maintain robust recovery capabilities:

  • S3 object storage with versioning, deletion protection, and cross-region replication
  • Database streaming cross-region replication with daily snapshots
  • Infrastructure-as-code enables rapid environment redeployment
  • Annual testing of disaster recovery procedures

Third-Party Security

We carefully manage our third-party relationships:

  • Vendor due diligence performed before engagement
  • Annual review of SOC 2 and ISO 27001 reports from critical providers
  • Security questionnaires for providers without formal certifications

Key service providers include:

  • AWS (infrastructure hosting)
  • Vercel (frontend hosting)
  • Honeycomb (observability)
  • PostHog (product analytics)

Your Security Responsibilities

Security is a shared responsibility. As a Chroma Cloud customer, you should:

  • Store Chroma Cloud API keys securely and encrypted
  • Use strong passwords that meet our application requirements
  • Enable multi-factor authentication where available
  • Manage team member accounts, permissions, and terminations appropriately
  • Maintain backups of your critical data
  • Implement appropriate security measures for your own infrastructure

Reporting Security Concerns

We take security seriously and welcome your feedback. You can report security incidents, vulnerabilities, or concerns to support@trychroma.com

We'll communicate any system changes that affect our security commitments to ensure you stay informed.

Compliance

Chroma Cloud has successfully completed a SOC 2 Type II examination. This independent assessment validated the suitability of the design of our security controls. The examination covers our security program and evaluates our controls against the Trust Services Criteria.