Yes, Bubble uses Amazon Web Services (AWS), which meets numerous security certifications such as SOC 2, CSA and ISO 27001. All data behind Bubble apps is stored in the cloud on AWS, typically in the AWS West region (Oregon, USA), which has a world-class security infrastructure. Other Bubble security features include:
AWS: All data is stored in the cloud via Amazon Web Services (AWS), the industry standard. Data is typically hosted in the AWS West Region (Oregon, USA), which has a state-of-the-art security infrastructure.
Encryption: All connections to bubble.is are encrypted via HTTPS. Users are encouraged to add encryption to their own domains as well. All user passwords are stored encrypted and salted in the Bubble database; other user data is stored encrypted (Bubble uses AWS RDS).
SSL: Bubble apps can add SSL encryption for their own domains under any paid plan. The default Bubble domain includes SSL.
Dedicatedinfrastructure: For large and complex apps, Bubble offers plans that use a dedicated AWS cluster infrastructure (instead of a shared infrastructure), resulting in more reliable performance and greater security.
Externaldatabase support: For projects that require specific database configurations (e.g. using a customer's Azure infrastructure or a HIPAA-compliant data archive), the Bubble application can be set up to communicate with an external database via API calls. However, this extends the development time compared to using the internal Bubble database.
Logs: Every action that changes data in a Bubble app's database is logged, so that an audit is possible if required.
Privacy rules: Bubble enables role-based privacy rules that control what data is sent from the server to the user's hardware. This adds an extra layer of security so that data does not fall into the wrong hands.
Privacy Policy: Bubble's privacy policy is available at bubble.is/terms. Bubble employees do not have access to customer data, except when it is necessary to solve technical problems on the platform. Access to customer data is restricted depending on the job role and is regularly reviewed to prevent misuse.