Security Statement - Technical and Organizational Measures
Updated October 1, 2024
Scarf is deeply committed to protecting the confidentiality, integrity and availability of our systems and our customers' data. We are constantly monitoring our security controls to analyze their effectiveness and appropriateness to give you confidence in our systems. Our security program is regularly reviewed and we have completed SOC2 Type 1 and SOC2 Type 2 examinations.
You may obtain detailed information about our security and compliance programs as well as a copy of our SOC 2 Type 2 report from your customer success contact.
Our providers employ robust controls to secure the availability and security of their systems. This includes measures such as backup power, fire detection and suppression equipment, secure device destruction amongst others. Learn more about Data Center Controls at AWS. https://aws.amazon.com/compliance/data-center/controls/
AWS implements layered physical security controls to ensure on-site security including, vetted security guards, fencing, video monitoring, intrusion detection technology and more. Learn more about AWS Physical Security.
https://aws.amazon.com/compliance/data-center/perimeter-layer/
Third party penetration tests are conducted against the application and supporting infrastructure at least annually. Any findings as a result of tests are tracked to remediation. Reports are available on request with an appropriate NDA in place.
Scarf deploys threat detection services within AWS to continuously monitor for malicious and unauthorized activity.
We perform regular internal scans for vulnerability scanning of infrastructure. Where issues are identified these are tracked until remediation.
Access is limited to a least privilege model required for our staff to carry out their jobs. This is subject to regular internal audit and technical enforcement and monitoring to ensure compliance. MFA is required for all production systems.
In Transit
Scarf data is encrypted at rest with industry standard AES-256 encryption. By default we encrypt at the asset or object level.
Uptime
Scarf maintains a publicly available status page which includes details on system availability, scheduled maintenance windows and service incident history details.
The Scarf gateway is deployed in multiple global regions. In the event of a major region outage, Scarf has the ability to deploy our application to a new hosting region. Our Disaster Recovery plan ensures availability of services and ease of recovery in the event of such a disaster. This plan is regularly tested and reviewed for areas of improvement or automation.
DR deployment is managed by the same configuration management and release processes as our production environment ensuring that all security configurations and controls are applied appropriately.
Environment Segregation
Security Awareness
Scarf has a comprehensive set of information security policies covering a range of topics. These are disseminated to all employees and contractors and acknowledgement tracked on key policies such as Acceptable Use, Information Security Policy and our Employee Handbook.
All Scarf employees undergo a background check prior to employment which covers 5 years criminal history where legal and 5 years employment verification.
All employees and contractors are required to sign Non-Disclosure and Confidentiality agreements.
Access to systems and network devices is based upon a documented, approved request process. Logical access to platform servers and management systems requires two-factor authentication. A periodic verification is performed to determine that the owner of a user ID is still employed and assigned to the appropriate role. Access is further restricted by system permissions using a least privilege methodology and all permissions require documented business need. Exceptions identified during the verification process are remediated. Business need revalidation is performed on a quarterly basis to determine that access is commensurate with the users job function. Exceptions identified during the revalidation process are remediated. User access is revoked upon termination of employment or change of job role.
Scarf’s privacy policy, which describes how we handle data collected by Scarf, can be found at https://about.scarf.sh/privacy-policy . For privacy questions or concerns, please contact help@scarf.sh.
Vendor Management
Scarf uses third-party sub processors to provide core infrastructure and services which support our applications. Prior to engaging any third party, Scarf evaluates a vendor’s security as per our Vendor Management Policy.
We consider the security of our system a top priority and believe that working with skilled researchers from the security community helps improve our security posture.
Below are the list of vulnerabilities that qualify to receive hall of fame
If you believe you have discovered a potential vulnerability, please let us know by emailing at: security@scarf.sh.
Provide us a reasonable amount of time to resolve the issue before disclosing it to the public or third party and provide sufficient information to reproduce the vulnerability.
Scarf does not offer cash rewards for reporting vulnerabilities through our Responsible Disclosure Policy.
Thank you for helping to keep Scarf and our users safe!