Security

Data Security /
Dealing with
Sensitive Data (PII)

Secure Tenancy​

Honeycomb Secure Tenancy offers two options to address your security/compliance requirements while delivering access to the fine-grained observability that you need. Both options make use of the Honeycomb Secure Proxy running in your infrastructure. No plaintext data ever traverses Honeycomb’s infrastructure and the Honeycomb UI presents complete transparency to authorized members of your team. You have complete control of key rotation and reissuance down to the columnar level from within your own infrastructure.

  • With Event Encryption, your datasets are encrypted and the keys are stored in a database on the Secure Proxy running in your infrastructure. When an authorized user accesses Honeycomb, their web browser connects to the Secure Proxy directly and the data is unencrypted for them. Honeycomb never has access to the sensitive data in plaintext.
  • With Event Hashing, your datasets are hashed and the hash mappings are stored in a database on the Secure Proxy running in your infrastructure. When an authorized user accesses Honeycomb, their browser sends the hashed data to the Secure Proxy running in your environment and receives the un-hashed data back. Again, no plaintext data reaches Honeycomb.

Download a one-page PDF overview of Secure Tenancy from Honeycomb.

Certifications and Compliance

We’re committed to maintaining best practices for ensuring security, availability, and confidentiality.

SOC 2 Type II

AICPA SOC logo

As part of this effort, Honeycomb annually completes an independent audit for our SOC 2 Type II report, which verifies our consistent application of the Trust Services Principles and Criteria over time. By periodically holding ourselves accountable to a third party, we hope to provide transparency to our customers and support our ongoing efforts to provide a secure and reliable environment for customer data.

Penetration Testing

We regularly undergo penetration testing by an independent security firm as part of our SOC 2 process and can furnish findings to customers as required.

GDPR

We are GDPR compliant and you can find our subprocessors here.

HIPAA

Our Secure Tenancy architecture is designed specifically for customers dealing with sensitive data like PHI. We can sign a Business Associate Agreement (BAA) with Enterprise customers who use the Secure Tenancy architecture and have compliance requirements under HIPAA/HITECH.

Special contracts

We will gladly explore custom DPAs with our customers when required.

Whistleblower Hotline

Honeycomb uses Safe Hotline, Inc for its ethics and whistleblower hotline. To raise an issue or concern anonymously, our Company ID number is 5570103805 (required for making reports); the toll-free phone number is 1-855-662-SAFE (1-855-662-7233) or you can submit a report at SAFEHOTLINE.COM.

Bug Bounty Program

Bug Bounty

We encourage responsible disclosure of security vulnerabilities through our bug bounty program. This page attempts to cover the most anticipated basic features of our policy; however the devil is always in the details, and it is not practical to cover every conceivable detail in advance. Whenever there is any room for interpretation or judgment, we will rely on our own discretion, informed by the circumstances and your actions.