Security

Security Controls

Octocom measures and policies for maintaining high security standards

Infrastructure security

ItemDescription
Auto ScalingOur infrastructure auto-scales to maintain high availability and support demand
Backups and monitoringOn an application level, we produce audit logs for all activity, ship logs to ELK for analysis and use Azure storage for archival purposes. All actions taken on production consoles or in the Octocom application are logged.
Denial of Service (DoS) ProtectionOctocom has measures to protect against Denial of Service (DoS) attacks.
Disaster RecoveryOctocom was built with disaster recovery in mind. All of our infrastructure and data are spread across 3 Azure availability zones and will continue to work should any one of those data centers fail.
Embargoed Countries RespectedWe block access to our product from an embargoed country based on the IP of the user.
Least privilegeAzure Security Groups employed for our infrastructure are baselined regularly to maintain least privilege. IAM roles granted to Octocom employees for our Azure production environment are baselined on a regular basis to maintain least privilege.
Network segmentationNetwork segmentation is implemented to separate sensitive systems and data from general user access networks.
Real-time monitoring and detectionAn endpoint monitoring tool / agent is deployed on all endpoints (corporate and production) to provide real-time monitoring, detection, and automated response to threats.
Virtual Private CloudAll of our servers are within our own virtual private cloud (VPC) with network access control lists (ACLs) that prevent unauthorized requests getting to our internal network.

Organizational security

ItemDescription
Background checksOctocom performs background checks on all new employees in accordance with local laws.
Employee confidentialityAll employee contracts include a confidentiality agreement.
Endpoint encryptionAll corporate devices are encrypted to protect data in case of loss or theft. They can be remotely wiped to prevent data leakage if a device is compromised or lost.
Endpoint managementWe push updates to employee laptops such that they are on the latest, patched version of their required operating system. We require the use of a managed browser with only an approved set of browser extensions to ensure that only devices meeting our security standards can access our IDP and the applications secured by it. This control ensures that access to critical systems is restricted to compliant and secure devices, enhancing our overall security posture.
Endpoint protectionAll corporate laptops are configured with endpoint protection (EPP) with procedures in place to ensure infected machines cannot access our systems.
Mandatory security awareness trainingAll employees undergo mandatory security awareness training on an annual basis. Certain higher risk roles go through additional training specific for their role and its associated risks, annually.

Product security

ItemDescription
Anti-abuseSign-ups to the Octocom product are fingerprinted, assessed for risk, and blocked or allowed to continue as necessary.
Customer Best PracticesThere are security features you can leverage to increase the security of your Octocom workspace.
Customer Data PortabilityCustomers can easily export and delete their data in compliance with GDPR and other data protection regulations.
Data Retention and Disposal PoliciesWorkspace data is deleted within 30 days of a workspace being electively deleted by its teammates. Workspaces and all related data are deleted after 180 days of inactivity.
EncryptionOctocom is served 100% over https. All data sent to or from Octocom is encrypted in transit using 256 bit encryption. Our API and application endpoints are TLS/SSL only and score an “A+” rating on Qualys SSL Labs‘ tests. This means we only use strong cipher suites and have features such as HSTS and Perfect Forward Secrecy fully enabled. We also encrypt data at rest using an industry-standard AES-256 encryption algorithm.
Multi-tenancy data protectionsSafeguards are in place such that data from one Octocom workspace can never be used or displayed within another workspace.
PermissionsWe enable permission levels within the app to be set for your teammates. Permissions can be set to include app settings, billing, user data or the ability to send or edit messages.
Product inbound email scanningWe scan the content of all inbound email into the Octocom app to limit the chances of customers receiving spoofed email, malware, or phishing attempts in their inbox.
Upload scanningTeammates and owners of an Octocom workspace can see the critical and breaking changes performed by teammates on their workspace.
SSO & 2FAYou can configure Octocom with SAML Single Sign-on (SSO) using Okta, OneLogin or another identity provider. We also provide support for Google SSO. If you’re using password-based authentication, you can turn on 2-factor authentication (2FA). More details on our docs.
Password complexityOctocom enforces a password complexity standard and credentials are stored using a PBKDF function (bcrypt).

Internal security procedures

ItemDescription
Code ReviewEach pull request to the Octocom code repositories must undergo a peer review before it can be accepted and merged.
Incident Response CoverageA member of the security team is always online and checking for alerts either through general on-call or outside hours coverage.
Incident Response ProcessOctocom implements a protocol for handling security events which includes escalation procedures, rapid mitigation and post mortem. All employees are informed of our policies. Security incidents and assumed security breaches are reported to relevant authorities as necessary.
On-call coverageA member of engineering is on-call 24/7 to respond to alerts and pages. They can escalate directly to a security team member as needed.
Security PoliciesOctocom has developed a comprehensive set of security policies covering a range of topics. These policies are updated frequently and shared with all employees.

Data and privacy

ItemDescription
Encryption at restWe also encrypt data at rest using an industry-standard AES-256 encryption algorithm.
Customer Data PortabilityCustomers can easily export and delete their data in compliance with GDPR and other data protection regulations.
Data Retention and Disposal PoliciesWorkspace data is deleted within 30 days of a workspace being electively deleted by its teammates. Workspaces and all related data are deleted after 180 days of inactivity.
Employee access control policiesAccess to customer data is limited to authorized employees who require it for their job. Any exceptional access to customer data happens with the consent of customers and has to be reviewed by the manager of the employee's engineering team thereafter, supplying a business need.

On this page