Last Updated: July 20, 2018
Protecting your information and the information of your employees is extremely important to us. We know you have questions about how we’re protecting that information, so what follows are details about some frequently requested information about 10,000ft’s information security.
Incident Response Plan
- We have implemented formal procedures for responding to security events.
- When security events are detected they are escalated to our security team who are notified to rapidly address the event.
- After a security event is fixed we write up a post-mortem analysis.
- The analysis is distributed across the company and includes action items that will make the detection and prevention of a similar event easier in the future.
- 10,000ft will promptly notify you in writing upon verification of a security breach of the 10,000ft services that affects your data. Notification will describe the breach and the status of 10,000ft’s investigation.
- All of our services operate in the AWS cloud. 10,000ft does not run on-premise routers, load balancers, DNS servers, or physical servers.
- All of our services and data are hosted in AWS in the USA and protected by AWS, as described at http://aws.amazon.com/security/sharing-the-securit….
- 10,000ft services have been built with disaster recovery in mind.
- All of our infrastructure is redundant with either passive or active failover capabilities. Amazon does not disclose the location of its data centers, but backups are not housed in the same facility as the live data.
- Our primary databases are encrypted.
- All of our servers are within our own virtual private cloud (VPC) with network access control lists (ACL’s) that prevent unauthorized requests getting to our internal network.
- All of our services are being actively monitored for potential security vulnerabilities and/or threats.
- Standard Operating Procedures (SOPs) are followed routinely (and audited) to ensure we meet compliance guidelines.
- We leverage AWS Relational Database Service (RDS) for daily backups. Backups are stored encrypted and are held for at least 30 days.
Business Continuity/Disaster Recovery
We have redundant data centers so that we can provide consistent services for you. In the event one of our data centers becomes unavailable, we can recover quickly so that you can keep working.
- All customer data is stored encrypted and resides in the USA.
- Customer data is stored in multi-tenant datastores; we do not have individual datastores for each customer. However, strict privacy controls exist in our application code that are designed to ensure data privacy and to prevent one customer from accessing another customer’s data (i.e., logical separation).
- Each 10,000ft system used to process customer data is adequately configured and maintained (via SOPs) using our own system-hardening standards.
- 10,000ft engages certain subprocessors to process customer data. These subprocessors are listed at subprocessors as may be updated by 10,000ft from time to time.
- All data sent to or from 10,000ft is encrypted in transit using 256-bit encryption.
- Our API and application endpoints are TLS/SSL only.
- 10,000ft is served 100% over https. 10,000ft runs a zero-trust corporate network.
- Additional layers of security are available through our SSO offerings as well.
- There are no corporate resources or additional privileges from being on 10,000ft’s corporate network.
- All access to 10,000ft applications is logged and audited.
- All actions taken on production consoles or in the 10,000ft application are logged.
Access to our systems and your data is restricted only to those who need access in order to provide you awesome support.
We also have all the “people security” things you’d expect to see:
- Background checks for our employees
- Signed confidentiality agreements
- Termination/access removal processes
- Acceptable use agreements.
- Annual Security Training
Security is the responsibility of everyone who works for us. We train our employees so that they can identify security risks and empower them to take action to prevent bad things from happening.
- We annually engage with well-regarded third-party security auditors to test our external vulnerability.
- We use technologies to provide an audit trail over our infrastructure and the 10,000ft application. Auditing allows us to do ad-hoc security analysis, track changes made to our setup and audit access to every layer of our stack.
- Information about AWS security certifications and obtaining copies of security reports from AWS is available at http://aws.amazon.com/compliance/pci-data-privacy-….
- Managing your own user accounts and roles from within the 10,000ft services.
- Enforce secure password policies in your organization.
- Compliance with the terms of your services agreement with 10,000ft, including with respect to compliance with laws.
- Promptly notifying 10,000ft if a user credential has been compromised or if you suspect possible suspicious activities that could negatively impact security of the 10,000ft services or your account.
- You may not perform any security penetration tests or security assessment activities without the express advance written consent of 10,000ft.