Table of contents
- Data center and network security
- Application security
- Product security features
- Compliance certification and memberships
We ensure the confidentiality and integrity of your data with industry best practices. Challo hosts service data in AWS data centers that have been certified as ISO 27001 and PCI/DSS Service Provider Level 1 compliant.
If you have questions for the Challo security team, or need to contact them regarding security alerts and events, send an email to: firstname.lastname@example.org.
|Facilities||Challo hosts service data in AWS data centers that have been certified as ISO 27001and PCI/DSS Service Provider Level 1 compliance.|
AWS infrastructure services includes back-up power, HVAC systems, and fire suppression equipment to help protect servers and your data.
|On-site security||AWS on-site security includes a number of features such as security guards, fencing, security video feeds, intrusion detection technology and other security measures.|
Learn more about AWS physical security.
|Monitoring||All production network systems, networked devices and circuits are constantly monitored and logically administered by Challo staff. |
Physical security, power and internet connectivity are monitored by AWS.
|Location||Challo leverages AWS data centers in the East Coast of the United States of America.|
|Dedicated security Team||The Challo security team is globally distributed to respond to security alerts and events.|
|Protection||Our network is protected through the use of key AWS security services, regular audits, and network intelligence technologies that monitors and blocks malicious traffic and network attacks.|
|Architecture||Our network security architecture consists of multiple AWS security availability zones.|
|Network vulnerability scanning||Network security scanning gives Challo deep insight for quick identification of out-of-compliance or potentially vulnerable systems.|
|Third-party penetration tests||Challo has an extensive internal scanning and testing program. Each year Challo employs third-party security experts to perform a broad penetration test across the Challo production network.|
|Intrusion detection and prevention||Service ingress and egress points are instrumented and monitored to detect anomalous behaviour. These systems are configured to generate alerts when incidents and values exceed predetermined thresholds, and use regularly updated signatures based on new threats. This includes 24/7 system monitoring.|
|Threat intelligence program||Challo participates in several threat intelligence sharing programs. Challo monitors threats posted to these threat intelligence networks and take action based on risk and exposure.|
|Logical access||Access to the Challo production network is restricted by an explicit need-to-know basis, utilizes least privilege, is frequently audited and monitored.|
|Security incident response||In case of a security alert events are escalated to Challo teams teams providing operations, network engineering and security coverage. Employees are trained on security incident response processes, including communication channels and escalation paths.|
|Encryption in transit||Communications between you and Challo servers are encrypted using industry best-practices protocols, such as HTTPS and Transport Layer Security (TLS), over public networks. TLS is also supported for encryption of emails.|
|Encryption at rest||Customers of Challo benefit from the protections of encryption at rest for their data. Service Data is encrypted at rest in AWS using AES 256 key encryption.|
|Tenant specific encryption||Challo uses keys that are specific to a tenant to encrypt data. It is not possible for one tenant to decrypt the data of another tenant.|
|Uptime||Challo maintains a publicly available system status page that includes system availability details, scheduled maintenance, service incident history, and relevant security events.|
See: Challo status page
|Redundancy||Challo employs service clustering and network redundancies to eliminate single points of failure. The Challo strict back-up regime and Enhanced Disaster Recovery service allow us to deliver a high level of service availability, as Service Data is replicated across availability zones.|
|Disaster recovery||The Challo Disaster Recovery (DR) program ensures that Challo services remain available or are easily recoverable in the case of a disaster. This is accomplished through building a robust technical environment, creating Disaster Recovery plans, and testing activities.|
|Enhanced disaster recovery||The Enhanced Disaster Recovery package adds contractual objectives for Recovery Time Objective (RTO) and Recovery Point Objective (RPO). These are supported through Challo’s capability to prioritize operations of Enhanced Disaster Recovery customers during any declared disaster event. *Only available with Advanced Security Add-on|
|Scalable service||Challo monitors network systems; if values exceed predetermined thresholds the architecture scales to meet the increase in demand, to ensure the quality of service is maintained across tenancies.|
Challo takes steps to develop securely and test against security threats to ensure the safety of Challo customer data. In addition, Challo employs third-party security experts to perform detailed penetration.
|Security training||At least annually, engineers participate in secure code training covering OWASP Top 10 security risks, common attack vectors, and Challo security controls.|
|Quality assurance||The Challo Quality Assurance (QA) department reviews and tests the Challo code base. Dedicated application security engineers on staff identify, test, and triage security vulnerabilities in code.|
|Separate environments||Testing and staging environments are logically separated from the production environment. |
No actual service data is used in the development of test environments.
|Dynamic vulnerability Scanning||Challo uses qualified third-party tooling to continuously dynamically scan the Challo core applications against the OWASP Top 10 security risks. Challo monitor these results actively and has a dedicated team to remediate any discovered issues.|
|Static code analysis||The source code repositories of Challo are scanned for security issues using Challo’s integrated static analysis tooling.|
Challo makes it seamless for customers to manage access and sharing policies with authentication and single-sign on (SSO) options. All communications with Challo servers are encrypted using industry-standard protocols, such as HTTPS, over public networks, meaning the traffic between you and Challo is secure.
|Authentication options||For Challo, you have the choice of registering and logging in using the Challo Authentication Service or SSO for end-user authentication.|
|Single sign-on (SSO)||Single sign-on (SSO) allows you to authenticate users in your own systems without requiring them to enter additional login credentials for your Challo instance.|
|Secure credential storage||Challo follows secure credential storage best practices by never storing passwords in human readable format, and only as the result of a secure, salted, one-way hash.|
|API security and authentication||The Challo API is TLS only. You can authorize against the API using either basic authentication with your username and password, or with a username and API token. OAuth authentication is also supported.|
|Tenant segregation||Customers can bring their own storage, that is only used for their data.|
Data that Challo stores uses different encryption keys such that it cannot be decrypted, or modified, by another tenant.
|Role-based access controls||Access to data within Challo applications is governed by role-based access control (RBAC), and can be configured to define granular access privileges. Challo has various permission levels for users.|
|Transmission security||All communications with the Challo UI and API are encrypted using industry standard HTTPS/TLS over public networks. This ensures that all traffic between you and Challo is secure during transit. For email, the Challo product also leverages opportunistic TLS by default. Transport Layer Security (TLS) encrypts and delivers email securely, mitigating eavesdropping between mail servers where peer services support this protocol.|
Challo implements security best practices to meet industry-based compliance and the most stringent requirements.
|ISO 27001:2013||Challo is ISO 27001:2013 certified. The certificate is available for download, see: Challo ISO 27001:2013 certificate|
|TRUSTe® privacy certification programs||Challo has certified compliance with the US-EU and Swiss – US Privacy Shield frameworks.|
This demonstrates that Challo’s privacy programs, policies, and practices meet the requirements of EU-US Privacy Shield and Swiss-US Privacy Shield.
Department of Commerce list of self-certified Privacy Shield.
Our certifications confirm that we comply with the Privacy Shield Principles for the transfer of European and Swiss personal data to the United States.
|Using Challo in a PCI environment||To ensure credit card data security, we have undergone PCI-DSS compliance. |
See: Challo PCI Certificate