The Spreaker platform runs on Amazon Web Services in the eu-west-1 and us-east-1 regions. We run our platform across multiple Availability Zones to ensure redundancy and resiliency to failures, and we work with a combination of managed and self-provisioned instances and services.
We manage our infrastructure following the IaC (Infrastructure as Code) principles. Instances are periodically rotated and replaced with new instances to ensure consistency with the defined state and to include the latest available security patches.
We run our software on docker containers that are automatically scanned for vulnerabilities against the Common Vulnerabilities and Exposures (CVEs) database. We periodically engage with 3rd party vendors to perform penetration testing on the Spreaker platform, and we run a public bug bounty program to ensure security issues are promptly addressed.
Data and Access Policies
Sensitive information is encrypted at rest. Data belonging to different Spreaker users is not segregated but strict access policies following the Least Privilege Principle are applied and continuously reviewed for both server-to-server and employees.
When a Spreaker account is deleted, an irreversible data erasure procedure takes place automatically after 30 days to ensure that PII are deleted and non recoverable. Listening statistics data is anonymised during ingestion so it cannot be correlated with individuals.
Web servers access logs are automatically deleted after 6 months, while security logs (eg: login attempts, password change requests) are kept indefinitely.
Payments are securely processed through Stripe or Paypal. Spreaker does not have access to customer credit card information, neither at rest or in transit.