Working in Amazon Web Services
ChurnZero is wholly hosted in the Amazon Web Services Public Cloud (AWS). All AWS security best practices are adhered to. ChurnZero employs a least access security methodology. Users with access to the platform are given the minimum level of access required for their job function, and access is audited every 90 days.
Network Access
System Hardening
Security Patches
DevOps User Access
Encryption In Transit
Encryption At Rest
Audit Logs
Malware and Virus Scanning
Isolated Data
Backups
Application Access
Customer data may only be accessed through the application layer. Whether this access is through the user interface or through the publicly available API, it enforces user access controls to regulate access to customer data only to authorized users. As such, ChurnZero does not provide direct access to any database. This approach prevents unauthorized services or systems from accidentally or maliciously retrieving or modifying customer data.
Role Based Access Control
Regional Deployments
Training
User Session Expiration
Continuous Security Monitoring
The ChurnZero application stack is continuously monitored for vulnerabilities and anomalies. We work with industry leaders like AlienVault, Detectify and Datadog to have deep, real-time visibility across our infrastructure in order to maintain continuous security for our customers and their data.
- Alerting on suspicious network activity such as command and control connections out of the environment and external scans into the environment,
- Alerting on API calls to the infrastructure which do not follow cloud infrastructure best practices, in all aspects of AWS services, including data services, serverless computing services and compute services,
- Auditing our infrastructure daily to ensure it adheres to AWS security best practices,
- Alerting upon discovery of vulnerable packages on the workload and providing CVE (Common Vulnerability and Exposures) information.
With breach detection based on behaviors, we minimize the time that our team needs to spend on identification, analysis of the incident, and process and reporting post-security alerts or incidents.
High Availability
Disaster Recovery
All critical data is copied on a nightly basis to another region in the same continent. ChurnZero Site Operations also maintains a DR by code infrastructure that can be spun up in another region to quickly restore systems and services in the event of a declared disaster.