Security at ConductorOne

At ConductorOne, our team is composed of long-time experts in security, identity, and infrastructure, who have built products from the ground up with highly secure environments.

We understand that our own security and privacy practices are mission-critical to our ability to provide modern privileged access and governance for our customers.

/images/2023_04_06_ConductorOne_Security.png

Employee Access

  • Internal systems use SSO and multi-factor authentication whenever possible

  • Secure password vaults are used for storing credentials when SSO is not supported by a system

  • Customer API Keys or secrets are not accessible from any internal tooling or dashboards

  • Background checks are performed annually for all employees

  • Security training is provided annually for all employees


Network

  • Employees do not have access to production servers (we only use AWS EKS Managed Node Groups with no remote access)

  • No workstations have network access to staging or production environments

  • WiFi in offices provides no additional permissions or authorization grants


Data & Infrastructure

  • Tenant isolation is ensured through decryption controls within tenant boundaries

  • Traffic to ConductorOne is encrypted using TLS 1.2 and greater

  • API keys and secrets are encrypted with AWS KMS symmetric keys and encrypted again at rest in storage

  • Internal services and traffic use mutual TLS

  • Objects are stored and encrypted at rest in AWS DynamoDB

  • Internet-facing API services are unable to decrypt data

  • Explicit firewall rules govern all service communications

  • Services employ highly specific security groups, managed in code


Service Availability

  • Our infrastructure is deployed across multiple availability zones (US West2 and US East2)

  • Disaster recovery dry-runs performed annually

  • Data in our object store (DynamoDB) is backed up continuously

  • Data is replicated across AWS regions


High Level Architecture

/images/security-mobile.png

Vulnerability Reporting

We deeply appreciate any effort to discover and coordinate the disclosure of security vulnerabilities. ConductorOne does not currently operate a public bug bounty program or offer monetary rewards for vulnerability reports, but individuals may be acknowledged in a wall of champions.

If you would like to report a vulnerability in one of our products or services, or have security concerns regarding ConductorOne software or systems, please email security@conductorone.com.

To support a timely and effective response to your report, please include any of the following:

  • Steps to reproduce or proof-of-concept
  • Any relevant tools, including versions used
  • Tool output

ConductorOne takes all vulnerability reports very seriously and aims to rapidly respond and verify the vulnerability before taking the necessary steps to address it. After an initial reply to your disclosure, which should be directly after receiving it, we will update you periodically with our response and remediation status.

Security issues related to ConductorOne-owned domains/properties that we have already assessed for risk and may address in future, and do not need to be reported to us, include:

  • HTTPS configuration, including supported TLS versions & ciphersuites
  • HTTP headers, for purposes including Strict Transport Security, Content Security Policy, and clickjacking/XSS protection
  • DNS records including those related to email (SPF, DKIM, DMARC) and certificate issuance (CAA)
  • Web applications that appear to allow users to set excessively long passwords

Contact our Security team