Attio uses an array of industry-technologies and services to protect your data against unauthorized access, disclosure, use, and loss.
All Attio Administrators undergo background checks and are routinely trained on security practices both during company onboarding and on a quarterly basis.
Security at Attio is directed by Attio's Head of Engineering and maintained by Attio's internal Infrastructure Engineering team.
Attio is certified against ISO 27001 by LRQA.
GDPR / CCPA
Attio is designed to comply with all requirements stated by the GDPR and the CCPA.
Attio is a UK registered company and is registered with the UK Information Commissioner's Office.
Where possible Attio makes tools available to our customers to allow them to meet their obligations to such legislation inside the platform.
Attio uses Stripe to handle payment and card information, which has been audited by an independent PCI Qualified Security Assessor and is certified as a PCI Level 1 Service Provider. This represents the most stringent level of certification available in the payments industry.
Attio does not typically receive credit card data, making it compliant with Payment Card Industry Data Security Standards (PCI DSS) in most cases.
Attio itself is not designed for the storage of PCI protected data and customers should ensure that they do not use the system in such a way that requires the storage of credit card information.
Vulnerability Disclosure Policy
Attio maintains a public Vulnerability Disclosure Program (VDP) at:https://attio.com/disclosure/policy
We take vulnerability disclosures extremely seriously. Once disclosures are received, we rapidly verify each vulnerability contained within the report before taking the necessary steps to contain and remediate the issue.
Once verified, we will periodically send status updates as the problems are fixed and will endeavour to work with the reporter to coordinate public disclosure should they so wish.
Attio has a well documented response process for the detection and resolution of Security Incidents.
Infrastructure and Network Security
Physical Access Control
The Attio Platform is hosted exclusively on Google Cloud Platform.
Google Cloud maintains both ISO 27001 certificates and SOC 2/3 reports which can be found here.
Datacenters used by Google Cloud Platform include extensive security measures built around a layered security model. These safeguards include:
- Vehicle Access Barriers
- Perimeter Fencing
- Metal Detectors
- Biometric Access Control
- Google Designed Electronic Access Control Cards
More information about the physical security of these datacenters can be found in thisGoogle Security Whitepaper.
Attio employees do not have physical access to any Google data centers, servers, networking equipment or storage media.
Logical Access Control
Attio is the assigned administrator of its infrastructure on Google Cloud Platform and only a small number of authorised Attio employees have access to configure this infrastructure. Where infrastructure configuration is done it is on an as-needed basis and requires two factor authentication.
Direct access to servers (such as SSH) is only done on an as-needed basis and uses detailed audit logging. SSH connections are protected using two-factor authentication and regularly rotated certificates.
Administrators connections to production servers are made over a private network.
Administration rights (including SSH, Database Access and Infrastructure Configuration) are tightly controlled and restricted to a very small number of our team.
Attio undergoes annual black box penetration testing by an accredited third-party agency.
Penetration testers are provided with a high-level diagram of application architecture and tests are run against our hosted production environment.
Information about any security vulnerabilities successfully exploited through penetration testing is used to set mitigation and remediation priorities. Customers on our Enterprise plan can request a summary of our latest penetration test findings by contacting their Account Manager.
Attio is certified against ISO 27001 by LRQA.
Intrusion Detection and Prevention
Attio uses a combination of host-based signals, network-based signals, and infrastructure signals to provide Intrusion Detection and Prevention systems (IDS/IPS).
We use both signature-based security and algorithm-based security to identify patterns that could represent an attack method.
Our IPS strategy involves tightly controlling the attack surface, employing intelligent and layered detection controls at data entry points, and deploying technologies that automatically remedy potentially dangerous situations.
Attio does not provide customers with access to security event forensics but does continue to provide support during and after any unscheduled downtime.
Business Continuity and Disaster Recovery
Every part of the Attio platform uses automatically provisioned, redundant servers to protect against failure.
Servers are regularly taken in and out of operation throughout the day as part of our routine operation without affecting availability.
Attio keeps regular daily and weekly backups of data in multiple geographic locations on Google Cloud Platform.
All backups are stored in an encrypted form.
In the case of platform-wide production data loss we are able to restore data from these backups.
We regularly test our ability to restore our infrastructure from the backups we maintain.
We routinely verify the integrity of the backups that we hold.
Attio primarily serves traffic from a single geographic region spread across multiple availability zones.
In the unlikely event of a prolonged regional outage we maintain a documented procedure for provisioning our deployment environment in a separate region.
Attio has an extensively documented Incident Response process that includes documented procedures for Business Continuity and Disaster Recovery.
Data Arriving from Customers
All customer data is sent to Attio via HTTPS using TLS 1.2 or above.
All Attio systems are configured to reject connections using TLS version below 1.2 or those using potentially insecure cipher suites.
Attio operates a zero-trust network meaning that all network traffic, even within our own network perimeter, is encrypted.
Attio regularly tests the availability and security of its SSL configuration using SSL Labs Reporting. The latest report can be viewedhere.
All requests into the system are logged and monitored using a combination of rule and anomaly-based systems.
Data Leaving the System
Attio allows customer's to access the data stored in Attio through several methods including:
- Our Web Application hosted at: https://app.attio.com
- Our Mobile Applications for Android and iOS
- Our Developer REST API hosted at: https://api.attio.com
All of the methods we provide to our customers for accessing their data ensure encryption in transit using TLS 1.2 or above.
Temporary Passcode Login
Attio provides users with the ability to sign in using temporary passwords.
Temporary passwords are valid for one hour after they are issued and have several automated defences against brute force attacks.
Attio provides the option for users to add an additional layer of security to their Attio account using Time-base One Time Passwords (TOTP).
Once enabled Two-Factor Authentication applies to all authentication methods including Single Sign-On.
Sign In with Google
Attio allows users to login using their Google or GSuite for Business account.
Attio participates in the Google Security Assessment program meaning our Sign In with Google flow is assessed for Security and Privacy annually by a Google nominated third-party auditor.
Customers on our Business or Enterprise plans are able to enable SAML-based authentication.
Workspaces are optionally able to force all of their users to authenticate using SAML 2.0 to align with their own authentication requirements.
REST API Authentication (API Key)
Attio provides a REST-ful API that allows our customers to access their data through integrations with other platforms.
API keys have been designed to be resistant to brute force attacks.
Customers are able to issue, modify, and revoke API tokens through their Workspace Settings page.
Secure Application Development (ADL / SDLC)
Attio uses a Continuous Integration and Continuous Deployment model which means all of our code changes are committed to a Source Code Repository, reviewed, tested, and shipped to our customers in a rapid sequence.
On a typical workday we will deploy between one and twenty versions of Attio to our customers.
Our rapid iteration development model significantly improves our response time to bugs, vulnerabilities, and security incidents.
Attio does not provide release notes to our customers for every version of the application that we deploy.
Attio believes that good security applies equally to our team as to our platform.
Attio maintains a comprehensive Malware Protection system backed by Malware Bytes and Apple GateKeeper.
Endpoint Security and Configuration
Attio uses Fleetsmith for Inventory Management and Configuration.
All Attio endpoints use Full Disk Encryption, Screen Lock, Remote Wipe, and strong passwords.
Attio uses a documented Risk Assessment and Treatment process.
Attio uses a combination of Asset and Scenario based Risk Assessments.
All deployments of Attio go through peer review, automated testing, and an automated deployment process that updates the production environment.
Attio performs a risk management and treatment of all systems and applications on a regular basis.
Attio places the Availability and Confidentiality of our platform at the top of our priorities.
Attio maintains a comprehensive Incident Response Process that includes designated Disaster Recovery and Customer Communication plans.
We test all of our Incident Response Processes quarterly and throughly review our test results for gaps.
We update our Incident Response Process at least annually.
Attio maintains a comprehensive set of documented Security Policies in our company wiki.
Our policies are designed in accordance with ISO 27001 and are updated on an ongoing basis and annually for gaps.
Customers on our Enterprise plan with special compliance requirements can request access to a more detailed overview of these policies from their Account Manager.
Attio conducts Background Checks using the UK Disclosure and Barring service for members of our team that have Administrator access to our infrastructure.
Attio maintains a comprehensive internal Security Training program for our team.
All Attio employees receive security training upon joining the team and quarterly thereafter.
Members of Attio's engineering team receive regular additional training that covers secure development practices, such as the OWASP Top Ten, in addition to our internal policies.
Incidence Response Policy
Attio follows a CERN (Contain, Eradicate, Recover, and Notify) security incident response process.
Where a Security incident affects the Confidentiality of customer data Attio will contact the registered Administrators of the Workspace.
Attio maintains a public status page athttps://status.attio.com which reports on operational issues.
Anyone can subscribe to updates via email from the status page.