Challo security datasheet

Data center and network security

We ensure the confidentiality and integrity of your data with industry best practices. Challo hosts service data in AWS data centers that have been certified as ISO 27001 and PCI/DSS Service Provider Level 1 compliant.

If you have questions for the Challo security team, or need to contact them regarding security alerts and events, send an email to:

Physical security

FacilitiesChallo hosts service data in AWS data centers that have been certified as ISO 27001and PCI/DSS Service Provider Level 1 compliance.
AWS infrastructure services includes back-up power, HVAC systems, and fire suppression equipment to help protect servers and your data.
On-site securityAWS on-site security includes a number of features such as security guards, fencing, security video feeds, intrusion detection technology and other security measures.
Learn more about AWS physical security.
MonitoringAll production network systems, networked devices and circuits are constantly monitored and logically administered by Challo staff.
Physical security, power and internet connectivity are monitored by AWS.
LocationChallo leverages AWS data centers in the East Coast of the United States of America.

Network security

Dedicated security TeamThe Challo security team is globally distributed to respond to security alerts and events.
ProtectionOur network is protected through the use of key AWS security services, regular audits, and network intelligence technologies that monitors and blocks malicious traffic and network attacks.
ArchitectureOur network security architecture consists of multiple AWS security availability zones.
Network vulnerability scanningNetwork security scanning gives Challo deep insight for quick identification of out-of-compliance or potentially vulnerable systems.
Third-party penetration testsChallo has an extensive internal scanning and testing program. Each year Challo employs third-party security experts to perform a broad penetration test across the Challo production network.
Intrusion detection and preventionService ingress and egress points are instrumented and monitored to detect anomalous behaviour. These systems are configured to generate alerts when incidents and values exceed predetermined thresholds, and use regularly updated signatures based on new threats. This includes 24/7 system monitoring.
Threat intelligence programChallo participates in several threat intelligence sharing programs. Challo monitors threats posted to these threat intelligence networks and take action based on risk and exposure.
Logical accessAccess to the Challo production network is restricted by an explicit need-to-know basis, utilizes least privilege, is frequently audited and monitored.
Security incident responseIn case of a security alert events are escalated to Challo teams teams providing operations, network engineering and security coverage. Employees are trained on security incident response processes, including communication channels and escalation paths.


Encryption in transitCommunications between you and Challo servers are encrypted using industry best-practices protocols, such as HTTPS and Transport Layer Security (TLS), over public networks. TLS is also supported for encryption of emails.
Encryption at restCustomers of Challo benefit from the protections of encryption at rest for their data. Service Data is encrypted at rest in AWS using AES 256 key encryption.
Tenant specific encryptionChallo uses keys that are specific to a tenant to encrypt data. It is not possible for one tenant to decrypt the data of another tenant.

Availability and continuity

UptimeChallo maintains a publicly available system status page that includes system availability details, scheduled maintenance, service incident history, and relevant security events.
See: Challo status page
RedundancyChallo employs service clustering and network redundancies to eliminate single points of failure. The Challo strict back-up regime and Enhanced Disaster Recovery service allow us to deliver a high level of service availability, as Service Data is replicated across availability zones.
Disaster recoveryThe Challo Disaster Recovery (DR) program ensures that Challo services remain available or are easily recoverable in the case of a disaster. This is accomplished through building a robust technical environment, creating Disaster Recovery plans, and testing activities.
Enhanced disaster recoveryThe Enhanced Disaster Recovery package adds contractual objectives for Recovery Time Objective (RTO) and Recovery Point Objective (RPO). These are supported through Challo’s capability to prioritize operations of Enhanced Disaster Recovery customers during any declared disaster event. *Only available with Advanced Security Add-on
Scalable serviceChallo monitors network systems; if values exceed predetermined thresholds the architecture scales to meet the increase in demand, to ensure the quality of service is maintained across tenancies.

Application security

Challo takes steps to develop securely and test against security threats to ensure the safety of Challo customer data. In addition, Challo employs third-party security experts to perform detailed penetration.

Secure development (SDLC)

Security trainingAt least annually, engineers participate in secure code training covering OWASP Top 10 security risks, common attack vectors, and Challo security controls.
Quality assuranceThe Challo Quality Assurance (QA) department reviews and tests the Challo code base. Dedicated application security engineers on staff identify, test, and triage security vulnerabilities in code.
Separate environmentsTesting and staging environments are logically separated from the production environment.
No actual service data is used in the development of test environments.

Application vulnerabilities

Dynamic vulnerability ScanningChallo uses qualified third-party tooling to continuously dynamically scan the Challo core applications against the OWASP Top 10 security risks. Challo monitor these results actively and has a dedicated team to remediate any discovered issues.
Static code analysisThe source code repositories of Challo are scanned for security issues using Challo’s integrated static analysis tooling.

Product security features

Challo makes it seamless for customers to manage access and sharing policies with authentication and single-sign on (SSO) options. All communications with Challo servers are encrypted using industry-standard protocols, such as HTTPS, over public networks, meaning the traffic between you and Challo is secure.

Authentication security

Authentication optionsFor Challo, you have the choice of registering and logging in using the Challo Authentication Service or SSO for end-user authentication.
Single sign-on (SSO)Single sign-on (SSO) allows you to authenticate users in your own systems without requiring them to enter additional login credentials for your Challo instance.
Secure credential storageChallo follows secure credential storage best practices by never storing passwords in human readable format, and only as the result of a secure, salted, one-way hash.
Tenant segregationCustomers can bring their own storage, that is only used for their data.
Data that Challo stores uses different encryption keys such that it cannot be decrypted, or modified, by another tenant.

Additional product security features

Role-based access controlsAccess to data within Challo applications is governed by role-based access control (RBAC), and can be configured to define granular access privileges. Challo has various permission levels for users.
Transmission securityAll communications with the Challo UI and API are encrypted using industry standard HTTPS/TLS over public networks. This ensures that all traffic between you and Challo is secure during transit. For email, the Challo product also leverages opportunistic TLS by default. Transport Layer Security (TLS) encrypts and delivers email securely, mitigating eavesdropping between mail servers where peer services support this protocol.

Compliance certification and memberships

Challo implements security best practices to meet industry-based compliance and the most stringent requirements.

Security compliance

ISO 27001:2013Challo is ISO 27001:2013 certified. The certificate is available for download, see: Challo ISO 27001:2013 certificate

Privacy certifications

TRUSTe® privacy certification programsChallo has certified compliance with the US-EU and Swiss – US Privacy Shield frameworks.
This demonstrates that Challo’s privacy programs, policies, and practices meet the requirements of EU-US Privacy Shield and Swiss-US Privacy Shield.
Department of Commerce list of self-certified Privacy Shield
Our certifications confirm that we comply with the Privacy Shield Principles for the transfer of European and Swiss personal data to the United States.
Privacy policySee: Challo privacy policy, for information about privacy, terms and cookie usage.

Industry-based compliance

Using Challo in a PCI environmentTo ensure credit card data security, we have undergone PCI-DSS compliance. 
See: Challo PCI Certificate

See also: