Overview
At Prophet Security we take the protection of Customer Data extremely seriously. This Prophet Security Security Policy describes the organizational and technical measures Prophet Security implements platform wide designed to prevent unauthorized access, use, alteration or disclosure of Customer Data. The Prophet Security Service operates on Amazon Web Services (“AWS”); this policy describes activities of Prophet Security within its instance on AWS unless otherwise specified. As you continue to learn more about Prophet Security we recommend you also review our Privacy Policy (https://www.prophetsecurity.ai/privacy-policy).
Our infrastructure and security team includes people who’ve played lead roles in designing, building, and operating highly secure Internet facing systems at companies ranging from startups to large public companies.
Best Practices
Incident Response Plan
- We have implemented a formal procedure for security events and have educated all our staff on our policies.
- When security events are detected they are escalated to our emergency alias, teams are paged, notified and assembled to rapidly address the event.
- After a security event is fixed we write up a post-mortem analysis.
- The analysis is reviewed in person, distributed across the company and includes action items that will make the detection and prevention of a similar event easier in the future.
- Prophet Security will promptly notify you in writing upon verification of a security breach of the Prophet Security Service that affects your data. Notification will describe the breach and the status of Prophet Security’s investigation.
Build Process Automation
- We have functioning, frequently used automation in place so that we can safely and reliably rollout changes to both our application and operating platform within minutes.
- We typically deploy code dozens of times a day, so we have high confidence that we can get a security fix out quickly when required.
Infrastructure
- All of our Service run in the cloud. Prophet Security does not run our own routers, load balancers, DNS servers, or physical servers.
- All of our Service and data is hosted in AWS facilities and protected by AWS security, as described at http://aws.amazon.com/security/sharing-the-security-responsibility. Prophet Security services have been built with disaster recovery in mind.
- All of our infrastructure is spread across AWS data centers (availability zones) and will continue to work should any one of those data centers fail unexpectedly. Amazon does not disclose the location of its data centers. As such, Prophet Security builds on the physical security and environmental controls provided by AWS. See http://aws.amazon.com/security for details of AWS security infrastructure.
- All of our servers are within our own virtual private cloud (VPC) with network access control lists (ACL’s) that prevent unauthorized requests getting to our internal network.
- Prophet Security uses a backup solution for datastores that contain Customer Data.
Data
- Customer Data is stored in individual datastores for each customer.
- Each Prophet Security instance used to process customer data is adequately configured and pathed using commercially-reasonable methods according to industry-recognized system-hardening standards.
- Prophet Security engages certain subprocessors to process customer data. These include Amazon Web Services, Microsoft Azure, Google Cloud Platform, Slack, Google Workspace, Pagerduty, SerpApi, IPInfo, DNSlytics and Spur.
Data Transfer
- All Customer Data sent to or from Prophet Security is encrypted in transit using 256-bit encryption.
- Our API and application endpoints are TLS/SSL only and score an "A+" rating on SSL Labs' tests. This means we only use strong cipher suites and have features such as HSTS and Perfect Forward Secrecy fully enabled.
- We also encrypt data at rest using an industry-standard AES-256 encryption algorithm.
Authentication
- Prophet Security is served 100% over https.
- There are no corporate resources or additional privileges from being on Prophet Security’s network.
- We have two-factor authentication (2FA) and strong password policies on GitHub, Google, AWS, and Prophet Security to ensure access to cloud services are protected.
Permissions and Admin Controls
- Prophet Security enables permission levels to be set for any employees with access to Prophet Security.
- Permissions and access can be set to include app settings, billing, user data, or the ability to send/edit manual messages and auto messages.
Application Monitoring
- On an application level, we produce audit logs for all activity, ship logs to our service providers for analysis, and use S3 for archival purposes.
- All access to Prophet Security Service is logged and audited.
- Bastion hosts are used to login to devices.
- All actions taken on production consoles or in the Prophet Security Service are logged.
Security Audits and Certifications
- We use technologies to provide an audit trail over our infrastructure and the Prophet Security Service. Auditing allows us to do ad-hoc security analysis, track changes made to our setup and audit access to every layer of our stack.
- Information about AWS security certifications and obtaining copies of security reports from AWS is available at http://aws.amazon.com/compliance/pci-data-privacy-protection-hipaa-soc-fedramp-faqs/
- Prophet Security has undergone a SOC 2 Type II audit. A copy of the applicable report can be made available upon reasonable request.
Customer Responsibilities
- Managing your own user accounts and roles from within the Prophet Security Service.
- Protecting your own account and user credentials by using two-factor authentication for all of your employees accessing the Prophet Security Service.
- Compliance with the terms of your Services agreement with Prophet Security, including with respect to compliance with laws.
- Promptly notifying Prophet Security if a user credential has been compromised or if you suspect possible suspicious activities that could negatively impact security of the Prophet Security Service or your account.
- You may not perform any security penetration tests or security assessment activities without the express advance written consent of Prophet Security.