HeyDropHeyDrop

Security Practices

Last updated: March 2026

A detailed overview of the technical and organizational measures HeyDrop implements to protect your data.

Infrastructure

HeyDrop runs on Amazon Web Services (AWS) infrastructure across multiple availability zones in the United States (us-east-1 and us-west-2 regions). Our infrastructure is designed for high availability, automatic scaling, and fault tolerance. All systems are monitored 24/7 with automated alerting and failover. AWS is certified under the EU-US Data Privacy Framework, enabling lawful international data transfers.

Encryption

All data at rest is encrypted using AES-256 via AWS Key Management Service (KMS). Data in transit is protected using TLS 1.2 or higher. Database connections, API communications, and file transfers all use encrypted channels. Secrets and credentials are stored in AWS Secrets Manager with automatic rotation policies.

Authentication & Access Control

We implement role-based access control (RBAC) across all internal systems. Employee access follows the principle of least privilege and is reviewed quarterly. Multi-factor authentication is required for all administrative and production system access. Session management includes automatic expiration and secure token handling.

Monitoring & Incident Response

We use continuous security monitoring with automated threat detection and anomaly alerts. Security events are logged, analyzed in real time, and retained according to our data retention policy. Our incident response plan includes defined severity levels, escalation procedures, communication protocols, and mandatory post-incident reviews.

Application Security

Our development process includes mandatory security code reviews, automated vulnerability scanning (SAST/DAST), and dependency auditing on every pull request. We follow OWASP Top 10 guidelines for secure development. Regular penetration testing is conducted by independent security firms, with findings remediated within defined SLAs.

Vendor & Supply Chain Security

All third-party vendors and subprocessors undergo security assessment before integration, including review of their SOC 2 reports, penetration test results, and data processing practices. We maintain Data Processing Agreements with all vendors handling customer data and conduct annual reviews.