Attio uses an array of industry-technologies and services to protect your data against unauthorized access, disclosure, use, and loss.
All Attio Administrators undergo background checks and are routinely trained on security practices both during company onboarding and on a quarterly basis.
Security at Attio is directed by Attio's Head of Engineering, and maintained by Attio's internal Security, Infrastructure and Performance team.
Compliance Certifications
ISO 27001
Attio is certified against ISO 27001 by A-LIGN. To access a copy of our ISO 27001 report, please reach out to [email protected].
GDPR / CCPA
Attio is designed to comply with all requirements stated by the GDPR and the CCPA.
Attio is a UK registered company and is registered with the UK Information Commissioner's Office.
Where possible Attio makes tools available to our customers to allow them to meet their obligations to such legislation inside the platform.
Vulnerability Disclosure Policy
Attio maintains a public Vulnerability Disclosure Policy at attio.com/disclosure/policy.
We take vulnerability disclosures extremely seriously. Once disclosures are received, we rapidly verify each vulnerability contained within the report before taking the necessary steps to contain and remediate the issue.
Once verified, we will periodically send status updates as the problems are fixed, and will endeavour to work with the reporter to coordinate public disclosure should they so wish.
Attio has a well documented response process for the detection and resolution of Security Incidents.
Infrastructure and Network Security
Physical Access Control
The Attio Platform is hosted exclusively on Google Cloud Platform.
Google Cloud maintains both ISO 27001 certification and SOC 2/3 reports, which can be accessed via their compliance page.
Access Control
Attio infrastructure on Google Cloud Platform can only be be accessed by a group of authorised Attio employees who are subject do extended background checks and regular training. Privileged access to Attio infrastructure is assigned in a Just-in-Time (JIT) fashion for a limited time and requires strong authentication. Each access request requires a business justification and management approval. All JIT access requests are audited.
Administration rights (including SSH, Database Access, and Infrastructure Configuration) are tightly controlled and restricted to a very small number of our team.
Penetration Testing
Attio undergoes annual black box penetration testing by an accredited third-party agency.
Penetration testers are provided with a high-level diagram of application architecture, and tests are run against our hosted production environment.
Information about any security vulnerabilities successfully exploited through penetration testing is used to set mitigation and remediation priorities. Customers on our Enterprise plan can request a summary of our latest penetration test findings by contacting their Account Manager.
Business Continuity and Disaster Recovery
High Availability
Every part of the Attio platform uses automatically provisioned, redundant servers to protect against failure.
Servers are regularly taken in and out of operation throughout the day as part of our routine operation without affecting availability.
Business Continuity
Attio keeps regular daily and weekly backups of data in multiple geographic locations on Google Cloud Platform.
All backups are stored in an encrypted form.
In the case of platform-wide production data loss, we are able to restore data from these backups.
We regularly test our ability to restore our infrastructure from the backups we maintain.
We routinely verify the integrity of the backups that we hold.
Disaster Recovery
Attio primarily serves traffic from a single geographic region spread across multiple availability zones.
In the unlikely event of a prolonged regional outage, we maintain a documented procedure for provisioning our deployment environment in a separate region.
Attio has an extensively documented Incident Response Process that includes documented procedures for Business Continuity and Disaster Recovery.
Data Flow
Data Arriving from Customers
All customer data is sent to Attio via HTTPS using TLS 1.2 or above.
All Attio systems are configured to reject connections using TLS version below 1.2 or those using potentially insecure cipher suites.
All requests into the system are logged and monitored using a combination of rule and anomaly-based systems.
Data Leaving the System
Attio allows customer's to access the data stored in Attio through several methods including:
All of the methods we provide to our customers for accessing their data ensure encryption in transit using TLS 1.2 or above.
Application Security
Temporary Passcode Login
Attio provides users with the ability to sign in using temporary passwords.
Temporary passwords are valid for one hour after they are issued and have several automated defenses against brute force attacks.
Sign In with Google
Attio allows users to login using their Google or Google Workspace account.
Attio participates in the Google Security Assessment program, meaning our Sign In with Google flow is assessed for Security and Privacy annually by a Google nominated third-party auditor.
SAML 2.0
Customers on our Enterprise plan can enable SAML-based authentication.
Workspaces are optionally able to force all of their users to authenticate using SAML 2.0 to align with their own authentication requirements.
REST API Authentication (API Key)
Attio provides a REST-ful API that allows our customers to access their data through integrations with other platforms.
API keys have been designed to be resistant to brute force attacks. Customers are able to issue, modify, and revoke API tokens through their Workspace Settings page.
Attio API also supports access tokens obtained via a OAuth 2.0.
Secure Application Development Process
Attio uses a Continuous Integration and Continuous Deployment model which means all of our code changes are committed to a Source Code Repository, reviewed, tested, and shipped to our customers in a rapid sequence. Every source code change is tracked on GitHub.
Our rapid iteration development model significantly improves our response time to bugs, vulnerabilities, and security incidents.
Corporate Security
Attio believes that good security applies equally to our team as to our platform.
Malware Protection
Attio maintains a comprehensive Malware Protection system backed by Apple Gatekeeper and XProtect.
Endpoint Security and Configuration
Attio uses FleetDM for Inventory Management and Configuration.
All Attio endpoints use Full Disk Encryption, Screen Lock, Remote Wipe, and strong passwords.
Risk Management
Attio uses a documented Risk Assessment and Treatment Process.
Attio uses a combination of Asset-based and Scenario-based Risk Assessments.
All deployments of Attio go through peer review, automated testing, and an automated deployment process that updates the production environment.
Attio performs a risk management and treatment of all systems and applications on a regular basis.
Contingency Planning
Attio places the Availability and Confidentiality of our platform at the top of our priorities.
Attio maintains a comprehensive Incident Response Process that includes designated Disaster Recovery and Customer Communication plans.
We test all of our Incident Response Processes quarterly, and throughly review our test results for gaps.
We update our Incident Response Process at least annually.
Security Policies
Attio maintains a comprehensive set of documented Security Policies in our company wiki.
Our policies are designed in accordance with ISO 27001, and are updated on an ongoing basis.
Customers on our Enterprise plan with special compliance requirements can contact their Account Manager to request access to a more detailed overview of these policies.
Background Checks
Attio conducts Background Checks using the UK Disclosure and Barring service for members of our team that have Administrator access to our infrastructure.
Security Training
Attio maintains a comprehensive internal Security Training program for our team.
All Attio employees receive security training upon joining the team and annually thereafter.
Members of Attio's engineering team receive regular additional training that covers secure development practices, such as the OWASP Top Ten, in addition to our internal policies.
Incidence Response Policy
Attio follows a CERN (Contain, Eradicate, Recover, and Notify) Security Incident Response Process.
Where a Security Incident affects the Confidentiality of customer data, Attio will contact the registered administrators of the workspace.
Attio maintains a public status page at status.attio.com, which reports on operational issues.
Anyone can subscribe to updates via email from the status page.