How we keep your Amazon data safe.

AMZBoost handles Amazon Selling Partner data for the brands we operate and the clients we serve. This page lays out the controls we run, the standards we hold, and how to report a problem.

Last reviewed: May 11, 2026

The controls behind every Amazon account we touch.

Every Amazon Selling Partner integration goes through these controls. No exceptions.

Encryption everywhere

TLS 1.2 or higher in transit, AES 256 at rest on database and backup storage. Keys are managed by our cloud provider's key management service with documented rotation.

Multi factor authentication

Every internal account that touches Selling Partner data requires multi factor authentication. No shared logins, no exceptions, including admin accounts.

Role based access

Staff access is granted by job function under the principle of least privilege. Production database access requires bastion authentication and is fully audit logged.

Documented incident response

A written incident response plan with named responders, severity tiers, and a six month review cadence. Incidents involving Amazon data are reported to security@amazon.com within 24 hours of detection.

Secure development life cycle

All code changes go through peer review. Dependencies are scanned for known vulnerabilities and patched within 14 days of high severity disclosures. Static analysis runs on every commit.

No secrets in code

Production credentials live in an encrypted secrets manager, never in source repositories or client side applications. Development environments use synthetic data only.

Network segmentation

Production runs in an isolated virtual private cloud. Database access is restricted to application servers within the VPC. Firewall, IDS, and web application firewall layers in front of every public surface.

Audit logging

Every access to Selling Partner data is logged with timestamp, user, action, and target. Logs are immutable, retained for 12 months, and reviewed monthly for anomalies.

Deletion on request

Sellers can request immediate deletion of their data at any time. Completed within 30 days, confirmation sent in writing. Default retention after deauthorization is 90 days, with backups purged within an additional 30 days.

What we commit to under Amazon's Selling Partner API agreement.

Eight commitments mapped to Amazon's Acceptable Use Policy and Data Protection Policy for Selling Partner API developers.

Network security.

We operate firewalls, intrusion detection and prevention, antivirus and antimalware, and network segmentation across all production systems.

Access restricted by job duty.

Access to Amazon Information is restricted to staff who need it for their role. Each role's permission set is documented and reviewed quarterly.

Encryption in transit.

All Amazon Information is encrypted using TLS 1.2 or higher anywhere it travels, including between our application and Amazon's Selling Partner API endpoints.

Incident response plan.

A written plan with defined roles, severity tiers, six month internal review cadence, and 24 hour internal notification on detection.

Amazon notification within 24 hours.

For any incident involving Amazon Information, we notify Amazon's security team at security@amazon.com within 24 hours of detection.

Password requirements.

12 character minimum, complexity requirements, multi factor authentication required, 365 day rotation, no shared accounts.

Credentials stored securely.

Passwords, encryption keys, and API tokens are stored in an encrypted secrets manager. Never in public repositories, never shared between staff, never hardcoded in applications.

Data sharing transparency.

We publish the full subprocessor list in our Data Protection Policy and update it when subprocessors change.

See something that looks wrong? Tell us directly.

We acknowledge security reports within 24 hours. We do not retaliate against researchers who report vulnerabilities in good faith and follow responsible disclosure practices. PGP available on request.

Email security@amzboost.com
Scroll to Top