Security and Reliability

At Bazaar Insights, we fully acknowledge that your content, product information, and customer data are among your organization’s most valuable assets. We are unwavering in our commitment to safeguarding your data and ensuring the protection of your investment in our technology and infrastructure. Below are essential security best practices and compliance tools that we employ with confidence and can share publicly.

Compliance

At Bazaar Insights, we understand that your content, product information, and customer-related personal data are among your organization's most valuable assets. We are fully committed to protecting your data and the investment you’ve made in our technology and infrastructure. Below, we share some key security best practices and compliance tools that we employ and make publicly available.

ProductXM and SupplierXM

The Information Security System that manages our ProductXM and SupplierXM platforms is based on ISO certification, which demonstrates our expertise in securely managing information technology systems.

ISO-27001-2022 ISO-22301-2019 ISO-27018-2019 ISO-9001-2015 ISO-27017-2015 cmmi-level-5

Certifications

ISO-27001-2022
ISO-27701
ISO-27017-2015
soc-logo
GDPR
ISO-22301-2019
ISO-27018-2019
cmmi-level-5
ISO-9001-2015
ISO/IEC 27001

ISO/IEC 27001 is a most popular independent global security standard. Organizations are certified with ISO's stringent international standards. Bazar Insight has been certified for Applications, Systems, People, Technology, and Processes under ISO/IEC 27001:2013

ISO/IEC 27701_2019

ISO/IEC 27701 is an add-on to the ISO/IEC 27001 and ISO/IEC 27002 standards for managing privacy in the context of the organization. The standard for certification is meant to add extra requirements to the existing Information Security Management System (ISMS) in order to establish, implement, maintain, and continue to improve a Privacy Information Management System (PIMS). This standard allows organisations to demonstrate compliance with the different privacy legislation around the globe which are relevant to them.

ISO/IEC 27017 _ 2015

ISO/IEC 27017 provides strong guidelines for information security controls related to cloud services, improving implementation of controls outlined in ISO/IEC 27002 and introducing additional relevant measures.

Bazaar Insights is certified under ISO/IEC 27017:2015 - Information Technology - Security Techniques - Code of Practice for Information Security Controls based on ISO/IEC 27002 for cloud services, reflecting our commitment to top-tier information security.

SOC 2 Type II

Bazaar Insights is SOC 2 Type II certified. SOC 2 is an assessment of the operating effectiveness and design of controls that address the AICPA's Trust Services Principles requirements.

GDPR

Bazaar Insights prioritizes the privacy and security of user data, exceeding industry standards. We welcome the General Data Protection Regulation (GDPR) as an improvement to our existing privacy policies.

Our products are designed to meet GDPR requirements, ensuring customer information is handled securely and transparently.

ISO 22301:2019

ISO 22301:2019 provides an international framework for establishing a Business Continuity Management System (BCMS). This system helps organizations identify and manage risks that could disrupt operations, ensuring the continuity of services to customers during unforeseen events. By implementing a BCMS, businesses can develop comprehensive recovery plans, reducing downtime and enhancing resilience against future disruptions.

ISO/IEC 27018:2019

ISO/IEC 27018 establishes commonly accepted control objectives, controls, and guidelines for safeguarding personally identifiable information (PII) processed in a public cloud. These controls are an extension of ISO/IEC 27001 and ISO/IEC 27002, providing guidance to organizations concerned about how their cloud providers handle PII.

cmmi-level-5

CMMI (Capability Maturity Model Integration) is a framework designed to help organizations improve their processes in areas such as software development, project management, and product/service delivery. Level 5 represents the highest maturity level, where organizations focus on innovation and continual process improvement.

ISO-9001-2015

ISO 9001:2015 is the worldwide standard that lays down the criteria for a quality management system (QMS). Organizations adopt this standard to provide assurance of their capability to deliver products and services that satisfy customers and regulatory requirements, consistently maintaining quality at each step.

People are both our greatest asset and our biggest security risk. To mitigate this risk, we ensure that all employees, including new hires, undergo annual security awareness training.

Access to our office is secured through keycode entry and other protective methods. Each employee is issued an individual key card to access our floor.

Before employment, we conduct thorough background checks on all prospective employees, which include criminal history and personal reference checks.

We conduct thorough background checks on all of our employees prior to employment, including criminal and personal reference checks.

We also have established off-boarding procedures to ensure that access permissions are terminated when an employee leaves the organization.

Uniform Security Protocols

Bazaar Insights maintains standardized security policies and processes, which are reviewed at least annually and updated as necessary. Our security framework is based on NIST 800 recommendations.

We conduct third-party security assessments at least once a year to evaluate vulnerabilities, perform penetration testing, and audit security controls. A letter of attestation can be provided upon request.

Our Incident Response Plan defines the roles of the Incident Commander and team members, covering the response process, customer notifications, and postmortem documentation. The Security Incident Response Plan outlines the responsibilities of the Security Incident Response Team (SIRT) and the steps for incident response.

Software Development Lifecycle (SDLC)

Bazaar Insights employs an agile development process with Continuous Integration (CI). Our CI pipeline encompasses development, staging, and production environments, ensuring authorized access controls for each environment.
Security is integrated at every step of our development process. Data handling, code deployment, configuration, and patch management all adhere to security best practices outlined in our security policies and SDLC.

Our SDLC mandates code review and approval for all changes, along with a successful build on all automated tests in our CI environment before deployment. All developed code undergoes both manual review and automated testing to identify potential security vulnerabilities. We strive to follow the best practices set forth by OWASP (Open Web Application Security Project).

Identified security vulnerabilities are subjected to an impact and risk assessment. Patches or other remediation measures are first deployed in a development environment, tested in staging, and then implemented in production.

Additionally, automated application penetration tests are conducted internally on a regular basis.

Administrative Control

Bazaar Insights adheres to the principle of "least privilege." We issue credentials only to individuals and systems that absolutely require access to a system or resource. Access can only be granted by a member of our Operations team and is tracked for auditing purposes. Administrators have the authority to revoke access at any time, which supports our off-boarding process.

Scalable Architecture

Bazaar Insights utilizes a resilient and scalable infrastructure for hosting services, ensuring fault tolerance and high availability as outlined in our Terms of Service. Our cloud providers maintain industry-standard compliance certifications, such as ISO 27001 and SOC 2, which we review annually.

All SSL certificates are generated with a 2048-bit key length and SHA-256, with the keys encrypted and securely stored using a key management service.

Data Resilience

Bazaar Insights' infrastructure is designed to support a robust disaster recovery process. Automated data backups, well-documented recovery procedures, and annual testing ensure that we are prepared in the event of a disaster
We have a defined Recovery Time Objective (RTO) and Recovery Point Objective (RPO) in place to maintain service continuity.

Access Control & Verification

Bazaar Insights relies on a cloud service provider solution that incorporates multi-factor authentication to access environments. User-defined groups and roles follow the "least privilege" principle.
Remote access to our infrastructure is strictly limited to authorized users and is only possible via our VPN.

Log monitoring is in place, with audit logs retained in accordance with our retention policy. Suspicious activities or unauthorized access trigger immediate alerts to our operations staff, and the security team is involved, when necessary, as part of our Incident Response plan.

Staff supporting our infrastructure have regularly rotated passwords for security.

End-User Data

We host customer data in a multi-tenant environment, ensuring data segregation at the application level for each customer. This approach prevents unauthorized access to customer data by other organizations.

All data traffic is encrypted using a minimum of TLS V1.2. We implement the latest encryption algorithms and continuously test and upgrade to newer, more secure standards as they emerge. Currently, we use 256-bit AES encryption, with key management as part of our cloud service provider’s offering.

Customer data is encrypted both in transit and at rest, including system and database backups. Access to customer data is restricted to authorized personnel only.

Unified Authentication (SSO)

At Bazaar Insights, we prioritize the security, availability, and performance of our services. Our infrastructure is resilient, elastically scalable, and fault-tolerant, ensuring consistent service and minimal downtime. We comply with industry standards, such as ISO 27001 and SOC 2, and review these reports annually.
High-Availability Architecture
We use fault-tolerant, scalable infrastructure to ensure high availability and consistent performance. Our SSL certificates are updated with a 2048-bit key length and SHA-256, and encryption keys are securely stored using a key management service.

Access Control

We maintain a comprehensive disaster recovery process with automated data backups, defined Recovery Time Objectives (RTO), and Recovery Point Objectives (RPO) to minimize service disruption.
Authentication & Authorization
We enforce multi-factor authentication (MFA) for secure access and apply the “least privilege” principle. Remote access is limited to authorized users via VPN. We monitor logs, retain them per policy, and respond swiftly to suspicious activity.

Event Tracking

Customer data is hosted in a multi-tenant environment with application-level segregation. We encrypt data in transit with TLS V1.2 or higher and at rest with 256-bit AES. Access is strictly limited to authorized personnel, ensuring your data is always protected.

At Bazaar Insights, we take security seriously and value the help of our community in keeping our services secure. If you have discovered a security vulnerability, we encourage you to report it responsibly.

Reporting Security Issues
To report a security-related bug or configuration issue, please review our Responsible Disclosure Guidelines before submitting your report. Your cooperation helps us address security concerns effectively and promptly.

Privacy Inquiries
For questions or concerns regarding privacy, please refer to our Privacy Policy for detailed information on how we handle your personal data.

Privacy

GDPR

Bazaar Insights system lays a strong foundation for GDPR compliance and helps reduce risk.

CCPA

Bazaar Insights has updated its privacy policy and internal procedures to comply with the CCPA.

Sub-Processors

To provide our platform services, we utilize chosen sub-processors to assist with specific functionalities.

Data Subject Requests

You may submit Data Subject Access Requests (DSAR) here.

REQUEST DEMO

Agreement

US Mutual Non-Disclosure Agreement

download

EMEA Mutual Non-Disclosure Agreement

download
Sub-Processors

To provide our platform services, we utilize chosen sub-processors to assist with specific functionalities.