Security

Last updated on: December 22, 2025

This document provides a consolidated, procurement‑ready overview of Bump.sh’s security, privacy, and operational controls.

Company profile

  • Legal entity: It Ducks SAS
  • Product name: Bump.sh
  • Country of registration: France
  • Primary operations: France

Legal identifiers, registration numbers, and statutory disclosures are provided in the Legal mentions page.

Service description & scope

Bump.sh is a cloud‑hosted SaaS platform for publishing, hosting, and comparing API documentation derived from OpenAPI and AsyncAPI specifications.

Scope boundaries

  • No access to customer production systems
  • No execution within customer environments
  • No processing of customer application runtime data

The service is intentionally designed to operate on documentation artifacts only. Bump.sh servers and application never access customer’s infrastructure.

Data protection & privacy

Detailed information regarding personal data processing, GDPR compliance, data subject rights, and privacy governance are available in the following documents:

Hosting & infrastructure security

  • Deployment model: Cloud‑only
  • Application hosting: Heroku (AWS)
  • Database: Managed PostgreSQL via Crunchy Data (AWS)
  • Search engine hosting: Koyeb
  • Data residency: Europe (Ireland and France)
  • Backups & redundancy: Enabled at infrastructure level

Bump.sh does not operate or manage customer‑side infrastructure.

Identity & access management

Authentication

  • SSO enforcement available
  • Bump.sh authentication may coexist with SSO (customer‑controlled)

User lifecycle management

  • Just‑in‑time (JIT) provisioning supported
  • Attribute‑based identity mapping (ID, email, first name, last name)
  • User expiration and deprovisioning supported

Application & supply chain security

  • Automated dependency monitoring (e.g. Dependabot)
  • Static security analysis integrated into CI pipelines
  • Mandatory pair code review on changes

Open source components

The hosted SaaS backend remains closed source.

Integrations

GitHub integration

  • Delivered as a GitHub Action, executed in the customer’s GitHub environment
  • Access limited to repositories and files explicitly configured by the customer
  • Permissions scoped to read‑only access for selected files
  • Typical use case: uploading OpenAPI definition files

No organization‑wide or network‑level access is required.

Availability, backup & recovery

  • Recovery Time Objective (RTO): 8 hours
  • Recovery Point Objective (RPO): 4 hours

Backups and redundancy are managed through cloud infrastructure providers.

Vulnerability management & testing

  • Bump.sh does not currently publish independent third‑party penetration test reports
  • Enterprise customers are permitted to conduct penetration tests on their own Bump.sh environment
    • Once per year
    • Prior coordination required

Identified issues are addressed collaboratively.

Incident management

  • Infrastructure and application monitoring in place (https://status.bump.sh)
  • Operational procedures exist for incident detection, response, and remediation

Certifications & external audits

  • No SOC 2, ISO 27001, or similar certifications at this time
  • This reflects the limited data scope and non‑intrusive architecture of the service
  • Alternative assurance mechanisms (customer‑run testing, architectural transparency) are available

Third‑party & vendor management

Key infrastructure providers

  • Heroku (AWS) – application hosting
  • Crunchy Data (AWS) – managed PostgreSQL
  • Koyeb - search engine hosting

Vendors are selected based on security maturity and industry adoption. Formal vendor security audits are not currently conducted.

Contractual, legal, and regulatory information are maintained in dedicated documents:

Frequently Asked Questions

Do you hold SOC 2 / ISO 27001 certifications? No. Bump.sh does not currently maintain formal third‑party security certifications. The service architecture minimizes data exposure and avoids access to customer systems.
Do you process sensitive or regulated data? No. Bump.sh processes API documentation files and limited account metadata only.
Where is data stored? All customer data is hosted in Europe: on AWS infrastructure (Ireland), and Koyeb (France).
Do you support SSO and centralized access control? Yes. Bump.sh supports SSO, JIT provisioning, and lifecycle controls through its partner [WorkOS](https://workos.com/).
Do you integrate into customer networks or environments? No. Integrations operate via customer‑initiated actions and scoped permissions only.
Can customers perform penetration testing? Yes. Enterprise customers may conduct annual penetration tests on their Bump.sh environment with prior coordination.
How do you manage dependencies and supply‑chain risk? Through automated dependency monitoring, static analysis, and CI‑based review processes.
Who is the security point of contact? All security inquiries can be directed to security@bump.sh.

Additional details can be provided upon request. Reach out to security@bump.sh.