
Security & Privacy
Security and privacy are fundamental to everything we do. Our comprehensive security program ensures your data is protected at every layer, from infrastructure to application code.
Infrastructure & Network
Our infrastructure is built on AWS with defense-in-depth principles, ensuring isolation, encrypted communication, and robust network controls.
AWS Fargate on ECS with isolated environments. Tasks run in private subnets with no public IPs, ensuring complete network isolation.
VPC with public and private subnets. Application Load Balancer restricted to CloudFront traffic only, enforcing strict ingress controls.
HTTPS enforced for all client connections via CloudFront. TLS 1.2+ for all external communications.
Amazon ECR with on-push image scanning enabled. Automated vulnerability detection for all container images.
Intelligent autoscaling policies for CPU and memory ensure optimal performance while maintaining security posture.
CloudWatch Logs with 365-day retention. Comprehensive audit trails and real-time monitoring of all infrastructure components.
Data Protection
Multi-layered encryption protects your data at rest, in transit, and in use, following industry best practices and compliance standards.
All production databases encrypted at rest with AWS managed encryption. Automated backups retained for 7 days with encryption protection.
TLS 1.2+ enforced across all network communications. HTTPS-only for client connections with HSTS headers for enhanced security.
AWS Secrets Manager for application secrets and credentials. AWS KMS for encryption keys stored in Hardware Security Modules (HSMs).
Production PostgreSQL databases run in private subnets and are not publicly accessible. Access is restricted to authorized ECS tasks and optional bastion/VPN connections. Database credentials are managed through AWS Secrets Manager with rotation capabilities.
Application Security
Secure by design with authentication, authorization, and input validation built into every layer of our application stack.
JWT-based authentication with role-aware access control. API key validation for sensitive endpoints. Password hashing with bcrypt industry-standard algorithms.
Strongly typed configuration with required field validation. Environment variables validated at startup to prevent misconfiguration.
Integration keys and sensitive credentials loaded from environment variables and AWS Secrets Manager. No hardcoded secrets in application code or images.
Environment files excluded from Docker builds. Secrets managed separately from application code. Type-safe configuration prevents common security pitfalls.
CI/CD & Supply Chain
Secure deployment pipelines with automated scanning, OIDC-based authentication, and controlled access to production environments.
GitHub Actions workflows with OIDC-based AWS authentication for secure, credential-free deployments. Container images tagged with commit SHAs for traceability.
ECR on-push scanning automatically detects vulnerabilities in container images. Deployment pipeline includes concurrency controls to prevent overlapping production deployments.
Compliance & Governance
Our security controls are designed with compliance in mind, following defense-in-depth and least privilege principles.
Access is limited to only those with legitimate business need and granted based on the principle of least privilege.
Security controls are implemented and layered according to the principle of defense-in-depth across all systems.
Security controls are applied consistently across all areas of the enterprise, ensuring uniform protection.
Monitoring & Operations
Comprehensive monitoring, logging, and health checks ensure we can detect and respond to issues quickly.
CloudWatch Logs with 365-day retention for all application and infrastructure logs. Structured logging enables efficient analysis and alerting.
Application Load Balancer health checks ensure only healthy tasks receive traffic. Automated rollback on deployment failures.
Security / Vulnerability Disclosure Program (VDP)
ZOM Technologies LLC welcomes responsible security research. If you believe you have found a security vulnerability in our products or services, please report it to us so we can investigate and remediate.
ZOM operates a public Vulnerability Disclosure Program (VDP) with discretionary rewards, which is appropriate for our current stage and fully satisfies SOC 2 requirements for vulnerability disclosure processes.
This is a Vulnerability Disclosure Program, not a formal bug bounty program with guaranteed monetary rewards.
Please include: affected URL or component, steps to reproduce, impact, and any screenshots/logs.
If you make a good-faith effort to follow this policy, avoid privacy violations, avoid service disruption, and report vulnerabilities promptly, ZOM will not pursue legal action against you for your security research.
We request coordinated disclosure. Please do not publicly disclose vulnerabilities until we have confirmed a fix or agreed on a timeline.
Program Type: Vulnerability Disclosure Program (VDP)
This is a Vulnerability Disclosure Program (VDP), not a formal bug bounty program. ZOM does not currently operate a guaranteed monetary bug bounty program with predefined reward tiers or platform listings.
No Guaranteed Reward Structure
This VDP does not have a guaranteed reward structure. There are no predefined reward tiers, minimum payouts, or guaranteed monetary compensation for vulnerability reports.
Discretionary Rewards
ZOM may, at its discretion, offer non-monetary recognition or monetary rewards for high-impact vulnerability reports based on:
All rewards are discretionary, not guaranteed, and determined on a case-by-case basis.
We continuously invest in security improvements and maintain transparency about our practices. For detailed security documentation or to report a security issue, please contact our security team.