Security Managment

Security & Compliance with Vanta

Crobox partners with Vanta to provide a secure and transparent Trust Center where customers can access key security and compliance information. Through our Vanta Trust Center, you can:

  • View real-time security status and compliance reports

  • Access security certifications and audit details

  • Review our data protection policies and practices

For the latest security updates, compliance documentation, and certifications, visit our Crobox Trust Centerarrow-up-right.

circle-info

If you need additional information, please contact your Account Manager.

Single Sign On (SSO)

Crobox supports Single Sign-On (SSO) to enhance security and streamline authentication. This feature allows users to log in via their organization’s identity provider (IdP) without needing separate credentials.

circle-info

If your organization is interested in enabling SSO, please contact your Account Manager for further steps.

Status Page

The status of Crobox and related infrastructure services is continuously monitored and updated on our Crobox Status Pagearrow-up-right.

To check the latest system status, simply click the link above. You can also subscribe to notifications about scheduled maintenance, service incidents, and updates. Access to notifications is controlled and limited to authorized users.\

FAQ

chevron-rightWhat subprocessors are involved, and where are the servers located?hashtag

Crobox utilizes trusted subprocessors for specific functionalities, such as hosting and system analytics. All of our (virtual) servers & services as well as our data storage is located within the European Union (region Europe-west 4 in the Netherlands). This includes our backup copies stored in Google Cloud. For certain AI functionalities, an LLM can be used for generalized analytics and product classifications, but the model will not be trained on it.

chevron-rightHow are backups managed, and what measures ensure data recovery and security?hashtag

Regular automated backups are conducted, encrypted, and stored in secure environments. Disaster recovery protocols are in place to ensure data retrieval within agreed SLAs.

chevron-rightHow does system and security logging use IP addresses?hashtag

Crobox’s platform logs all communication that takes place on our platform, as we need this data for system and security purposes. For example, this log is used to detect and protect against Distributed Denial of Service (DDOS) attacks.

This log data is raw system data that doesn’t have any correlation, interpretation, or other enrichment processes involved. However, system logging does include IP addresses, as these are required for security and system logging and thus can’t be excluded. To further minimize any impact, this system data is only stored in the logging infrastructure and is automatically removed after 14 days.

chevron-rightWhat is your process for managing and reporting performance or availability issues with the infrastructure?hashtag

Infrastructure performance or incidents are managed according to the agreed SLA. Additionally, infrastructure incident reports are made available on our status pagearrow-up-right, where stakeholders can subscribe to receive notifications. Access to notifications is controlled and limited to authorized users.

chevron-rightHow are vulnerabilities detected?hashtag

We implement daily automated scans and continuous system monitoring to identify vulnerabilities. This proactive approach ensures that any security issues or necessary patches are promptly detected and addressed. Next to this we do a yearly penetration test with an external partner, and upload the results in our Vanta Trust Centerarrow-up-right.

Finally, we are working together with the Hacker One program, which invites ethical hackers to find vulnerabilities in exchange for rewards.

chevron-rightWhich other cloud services are integrated, and how are they authenticated or authorized?hashtag

We use Google Cloud for our hosting and infrastructure, with secure authentication and authorization mechanisms in place for all connected cloud services. These connections are protected by industry-standard security protocols. For more information, refer to our GDPR Legal Service Agreementarrow-up-right.

Last updated

Was this helpful?