Skip to content
Campora
Product Features Demo Contact
EN ES CA FR
Request a demo

Security

Last updated: December 26, 2025

1. Our Security Commitment

At Campora Cloud, operated by Campora Tech, S.L. (Torredembarra, Spain), security is not an afterthought—it's foundational to everything we build. We implement enterprise-grade security measures to protect your data, maintain system integrity, and ensure business continuity.

2. Infrastructure Security

2.1 Cloud Infrastructure

  • Provider: Amazon Web Services (AWS) - EU regions only
  • Certifications: ISO 27001, SOC 2 Type II, PCI DSS Level 1
  • Data Centers: Tier III+ facilities with redundant power, cooling, and network connectivity
  • Geographic Redundancy: Multi-region deployment for disaster recovery

2.2 Network Security

  • Firewalls: Web Application Firewall (WAF) to block malicious traffic
  • DDoS Protection: AWS Shield Standard and Advanced protection
  • Network Segmentation: Isolated VPCs with strict security group rules
  • Intrusion Detection: Real-time monitoring and automated threat response

3. Data Security

3.1 Encryption

  • In Transit: TLS 1.3 for all data transmissions (minimum TLS 1.2)
  • At Rest: AES-256 encryption for all stored data
  • Database Encryption: Full database encryption with key rotation
  • Backup Encryption: All backups encrypted with separate keys

3.2 Data Isolation

  • Multi-Tenancy: Complete logical data isolation between customers
  • Database Separation: Schema-level isolation with row-level security
  • Access Controls: Strict authorization checks prevent cross-tenant data access

3.3 Backup and Recovery

  • Automated Backups: Daily automated backups with 30-day retention
  • Point-in-Time Recovery: Restore to any point within 7 days
  • Geographic Redundancy: Backups replicated to multiple regions
  • Recovery Time Objective (RTO): 4 hours
  • Recovery Point Objective (RPO): 1 hour

4. Application Security

4.1 Secure Development

  • Security by Design: Security requirements integrated from project inception
  • Code Reviews: Mandatory peer reviews for all code changes
  • Static Analysis: Automated security scanning in CI/CD pipeline
  • Dependency Scanning: Continuous monitoring for vulnerable dependencies

4.2 Vulnerability Management

  • Regular Scans: Weekly automated vulnerability assessments
  • Penetration Testing: Annual third-party security audits
  • Bug Bounty Program: Responsible disclosure program for security researchers
  • Patch Management: Critical vulnerabilities patched within 24-48 hours

4.3 Security Testing

  • OWASP Top 10 vulnerability testing
  • SQL injection and XSS prevention
  • CSRF protection on all state-changing operations
  • Input validation and sanitization
  • Secure session management

5. Access Control and Authentication

5.1 User Authentication

  • Strong Passwords: Minimum 12 characters with complexity requirements
  • Multi-Factor Authentication (MFA): Available for all accounts, required for admins
  • Session Management: Automatic timeout after 30 minutes of inactivity
  • OAuth 2.0: Secure third-party integration authentication

5.2 Role-Based Access Control (RBAC)

  • Principle of Least Privilege: Users have minimum necessary permissions
  • Granular Permissions: Fine-grained control over feature access
  • Audit Trails: Comprehensive logging of all access and changes
  • Regular Reviews: Quarterly access rights audits

5.3 Employee Access

  • Background Checks: All employees undergo security screening
  • Confidentiality Agreements: NDAs signed by all staff
  • Limited Access: Production data access strictly controlled
  • Monitoring: All employee access logged and monitored

6. Monitoring and Incident Response

6.1 Security Monitoring

  • 24/7 Monitoring: Continuous security monitoring and alerting
  • Log Management: Centralized logging with 1-year retention
  • Anomaly Detection: AI-powered detection of suspicious behavior
  • Real-Time Alerts: Immediate notification of security events

6.2 Incident Response

  • Incident Response Plan: Documented procedures for security incidents
  • Response Team: Dedicated security incident response team
  • Notification: Customer notification within 72 hours for data breaches
  • Post-Incident Review: Root cause analysis and remediation

7. Compliance and Certifications

7.1 Current Compliance

  • GDPR: Full compliance with EU data protection regulations
  • ePrivacy Directive: Compliance with EU electronic communications rules
  • PCI DSS: Payment card data security standards
  • Verifactu: Spanish tax compliance for invoicing

7.2 In Progress

  • ISO 27001: Information Security Management System certification
  • SOC 2 Type II: Third-party security audit

8. Business Continuity

8.1 High Availability

  • Uptime SLA: 99.9% availability guarantee
  • Load Balancing: Distributed traffic across multiple servers
  • Auto-Scaling: Automatic capacity adjustment for traffic spikes
  • Health Checks: Continuous monitoring and automatic failover

8.2 Disaster Recovery

  • Multi-Region Deployment: Active-passive setup across EU regions
  • Regular Testing: Quarterly disaster recovery drills
  • Business Continuity Plan: Documented procedures for major incidents

9. Third-Party Security

9.1 Vendor Management

  • Security Assessments: Due diligence for all vendors
  • Contracts: Security requirements in vendor agreements
  • Regular Reviews: Ongoing evaluation of vendor security posture

9.2 Integration Security

  • API Security: OAuth 2.0 and API key authentication
  • Rate Limiting: Protection against API abuse
  • Input Validation: Strict validation of all external data

10. Physical Security

Our infrastructure is hosted in AWS data centers with:

  • 24/7 security personnel
  • Biometric access controls
  • Video surveillance
  • Mantrap entry systems
  • Regular security audits

11. Security Training and Awareness

  • Onboarding Training: Security fundamentals for all new employees
  • Annual Training: Mandatory annual security awareness training
  • Phishing Tests: Regular simulated phishing campaigns
  • Security Champions: Designated security advocates in each team

12. Customer Security Responsibilities

While we provide robust security, customers are responsible for:

  • Using strong, unique passwords
  • Enabling multi-factor authentication
  • Protecting account credentials
  • Reporting suspicious activity
  • Configuring appropriate user permissions
  • Keeping integration credentials secure

13. Reporting Security Issues

If you discover a security vulnerability:

  • Email: admin@campora.cloud
  • Response Time: We acknowledge reports within 24 hours
  • Responsible Disclosure: We request 90 days to address issues before public disclosure
  • Recognition: Security researchers acknowledged on our security page

14. Security Transparency

We maintain transparency through:

  • Status Page: Real-time service status at status.campora.cloud
  • Incident Reports: Post-mortem reports for major incidents
  • Security Updates: Regular communication about security improvements
  • Audit Reports: Available upon request for enterprise customers

15. Questions and Contact

For security-related questions or concerns:

  • Company: Campora Tech, S.L.
  • Location: Torredembarra, Spain
  • Security Team: admin@campora.cloud
  • General Support: admin@campora.cloud
Campora

Modern PMS for campsites and resorts that want cleaner operations, stronger control, and a more credible guest journey.

EN ES CA FR

Navigation

  • Product
  • Features
  • Demo
  • Contact

Contact

  • admin@campora.cloud
  • Torredembarra, Spain

Legal

  • Privacy
  • Terms
  • GDPR
  • Security

© Campora Cloud. All rights reserved.