At ConductorOne, our team is composed of long-time experts in security, identity, and infrastructure, who have built products from the ground up with highly secure environments.
We understand that our own security and privacy practices are mission-critical to our ability to provide modern privileged access and governance for our customers.
Internal systems use SSO and multi-factor authentication whenever possible
Secure password vaults are used for storing credentials when SSO is not supported by a system
Customer API Keys or secrets are not accessible from any internal tooling or dashboards
Background checks are performed annually for all employees
Security training is provided annually for all employees
Network
Employees do not have access to production servers (we only use AWS EKS Managed Node Groups with no remote access)
No workstations have network access to staging or production environments
WiFi in offices provides no additional permissions or authorization grants
Data & Infrastructure
Tenant isolation is ensured through decryption controls within tenant boundaries
Traffic to ConductorOne is encrypted using TLS 1.2 and greater
API keys and secrets are encrypted with AWS KMS symmetric keys and encrypted again at rest in storage
Internal services and traffic use mutual TLS
Objects are stored and encrypted at rest in AWS DynamoDB
Internet-facing API services are unable to decrypt data
Explicit firewall rules govern all service communications
Services employ highly specific security groups, managed in code
Service Availability
Our infrastructure is deployed across multiple availability zones (US West2 and US East2)
Disaster recovery dry-runs performed annually
Data in our object store (DynamoDB) is backed up continuously
Data is replicated across AWS regions
High Level Architecture
Vulnerability Reporting
We deeply appreciate any effort to discover and coordinate the disclosure of security vulnerabilities. ConductorOne does not currently operate a public bug bounty program or offer monetary rewards for vulnerability reports, but individuals may be acknowledged in a wall of champions.
If you would like to report a vulnerability in one of our products or services, or have security concerns regarding ConductorOne software or systems, please email security@conductorone.com.
To support a timely and effective response to your report, please include any of the following:
Steps to reproduce or proof-of-concept
Any relevant tools, including versions used
Tool output
ConductorOne takes all vulnerability reports very seriously and aims to rapidly respond and verify the vulnerability before taking the necessary steps to address it. After an initial reply to your disclosure, which should be directly after receiving it, we will update you periodically with our response and remediation status.
Security issues related to ConductorOne-owned domains/properties that we have already assessed for risk and may address in future, and do not need to be reported to us, include:
HTTPS configuration, including supported TLS versions & ciphersuites
HTTP headers, for purposes including Strict Transport Security, Content Security Policy, and clickjacking/XSS protection
DNS records including those related to email (SPF, DKIM, DMARC) and certificate issuance (CAA)
Web applications that appear to allow users to set excessively long passwords
Contact our Security team
To report other security or privacy issues that affect ConductorOne, please contact security@conductorone.com.