Bluscout Logo
TRUST PAGE

Security You Can Trust

Our security platform is built entirely in Rust, a modern programming language engineered for safety and reliability. This reduces the risk of software vulnerabilities and ensures that your logs, credentials, and sensitive operational data are handled securely from the ground up.

Security starts at the code level, giving you confidence that the foundation of your platform is solid. It is designed to help customers meet SOC 2, ISO 27001, and other compliance obligations.

Enterprise-Grade Identity & Access Protection

We safeguard user access with a hardened authentication stack that follows modern security standards. Our platform uses strong password hashing, validated JWT tokens, multi-factor authentication (TOTP), and secure-by-default session controls.

We align with OWASP ASVS and NIST 800-63B guidance to ensure your identity perimeter stays protected.

Granular Role-Based Access Control

Access is enforced through fine-grained role-based access control (RBAC), ensuring every user and service interacts only with the components they are authorized for. Dedicated system and database accounts operate under least privilege principles, following ISO 27001 A.9 and CIS hardening guidance.

End-to-End Transport Security

All communications between agents, collectors, and services are encrypted using TLS, with optional mutual TLS and client certificate verification for high-assurance environments. Ingestion paths can be restricted via IP allow-lists, ensuring that only trusted sources can connect.

Our transport layer aligns with NIST SP 800-52 and OWASP ASVS recommendations.

Protection of Secrets & Configurations

Secrets and configuration data are protected with strict filesystem controls and isolated service environments. Sensitive operational data is never exposed unnecessarily. This approach follows ISO 27001 A.12 secure configuration principles and helps prevent unauthorized access or accidental leakage.

Robust Logging, Auditing & Retention

Our platform provides complete audit visibility with structured logging pipelines, defined retention policies, and hot-to-cold storage transitions for logs, packets, and endpoint data.

These controls support ISO 27001 A.12/A.18 and SOC 2 expectations for auditability and evidence retention, ensuring you always have the information you need for compliance and security investigations.

Hardened Deployment Architecture

Each subsystem runs under its own dedicated service account with minimal privileges. We eliminate unnecessary root access using capability-based permissions and ship with hardened defaults — including removal of default ClickHouse accounts.

This architecture adheres to CIS benchmark-aligned practices, delivering strong security right out of the box.

Flexible Deployment, Uncompromised Security

Whether deployed on-premise or in the cloud, Bluscout maintains the same security posture. Cloud deployments use single-tenant, isolated environments—your data never shares infrastructure with other customers. Choose your region, your cloud provider, and deploy with confidence knowing you get dedicated resources with enterprise-grade isolation.

On-premise deployments offer complete data sovereignty and air-gapped options for the most sensitive environments.