CI/CD is the foundation of engineering productivity and speed. At CircleCI, we know that a team’s velocity must go hand in hand with building securely. World-class engineering teams don’t sacrifice security for speed, but rather, choose platforms like CircleCI that deliver both.
Our product philosophy for our customers has 8 pillars:
We are constantly evaluating how we can improve both our internal security posture, and how we improve security for our customers. We invite questions and conversations on security at CircleCI and look forward to working with you to improve the security of the software ecosystem as a whole.
For customers interested in signing a Data Processing Addendum with CircleCI, you can sign our DPA here.
Control | Status |
---|---|
Remote access encrypted enforced The company's production systems can only be remotely accessed by authorized employees via an approved encrypted connection. |
Control | Status |
---|---|
Anti-malware technology utilized The company deploys anti-malware technology to environments commonly susceptible to malicious attacks and configures this to be updated routinely, logged, and installed on all relevant systems. | |
MDM system utilized The company has a mobile device management (MDM) system in place to centrally manage mobile devices supporting the service. |
Control | Status |
---|---|
Control self-assessments conducted The company performs control self-assessments at least annually to gain assurance that controls are in place and operating effectively. Corrective actions are taken based on relevant findings. If the company has committed to an SLA for a finding, the corrective action is completed within that SLA. |
Control | Status |
---|---|
Development lifecycle established The company has a formal systems development life cycle (SDLC) methodology in place that governs the development, acquisition, implementation, changes (including emergency changes), and maintenance of information systems and related technology requirements. |
Top