Details of how Bugsnag keeps your data secure.
We take information security very seriously and use information security best practices across the entire stack, from infrastructure to code. We work with leading information security firms to ensure that our security practices are current and validated.
Bugsnag servers are hosted on the Google Cloud Platform (GCP) in facilities compliant with leading security standards, including SSAE 16, PCI DSS Level 1, ISO 9001 / ISO 27001, and many more. Any decommissioned storage devices are destroyed. Find out more about Google Cloud Platform security in the Google Security Whitepaper.
The data centers are secured by professional security personnel. Video surveillance, intrusion detection systems, and additional electronic systems are used to ensure access to these facilities is properly managed.
We use data centers based in the United States.
Our network is protected by redundant layer 7 firewalls, best-in-class router technology, secure HTTPS transport over public networks, and regular audits.
Our network security architecture consists of multiple security zones of trust. More sensitive systems, like our database servers, are protected in our most trusted zones. Other systems are housed in zones commensurate with their sensitivity, depending on function, information classification, and risk. Depending on the zone, additional security monitoring and access controls will apply. DMZs are utilized between the Internet, and internally, between the different zones of trust.
In addition to our extensive internal scanning and testing program, Bugsnag regularly employs third-party security experts to perform a broad penetration test across the Bugsnag production network. Details are available on request.
Access to the Bugsnag production network is restricted by an explicit need-to-know basis, utilizes least privilege, is frequently audited and monitored, and is controlled by our Operations Team. Employees accessing the Bugsnag production network are required to use multiple factors of authentication.
In case of a system alert, events are escalated to our 24/7 teams providing Operations, Network Engineering, and Security coverage. Employees are trained on security incident response processes, including communication channels and escalation paths.
Communications between you and Bugsnag servers are encrypted via industry best-practice HTTPS and Transport Layer Security (TLS) by default.
Bugsnag supports encryption of customer data at rest. Contact us to learn more about availability.
Bugsnag maintains a publicly available system status webpage at https://status.bugsnag.com that includes system availability details, scheduled maintenance, service incident history, and relevant security events.
Bugsnag’s service clustering and network redundancies eliminate single point of failure. Our strict backup regime ensures customer data is actively replicated across both systems and facilities.
Data center facilities are equipped with advanced fire detection and suppression systems, electrical power outage protection systems, and climate management systems.
Our disaster recovery program ensures that our services remain available or are easily recoverable in the case of a disaster. This is accomplished through building a robust technical environment, creating disaster recovery plans, and testing.
All employees participate in security best practices training.
We use leading tools and techniques to protect against common security vulnerabilities. These include, but are not limited to, Cross Site Scripting (XSS), Cross Site Request Forgery (CSRF), and SQL Injection.
Protection against these attack vectors is evaluated as part of our third-party security audit.
Development and test environments are separated physically and logically from the production environment. No actual customer data is used in the development or test environments.
Bugsnag regularly employs third-party security experts to perform detailed penetration tests on the application and APIs. Details are available on request.
Our Responsible Disclosure Program gives security researchers an avenue for safely testing and notifying Bugsnag of security vulnerabilities.
Bugsnag supports 2FA using apps like Google Authenticator and Authy. 2FA provides additional layer of security to your Bugsnag account, making it more challenging for somebody else to sign in as you. Learn more about 2FA support.
Bugsnag follows secure credential storage best practices by never storing passwords in human readable format, and only as the result of a secure, salted, one-way hash.
Bugsnag’s data access API is TLS-only and you must be a verified user to make API requests. You can authenticate against the API using either your username and password, or an API token.
Access to data within Bugsnag is governed by role and access rights configured within your organization. Organization admins can grant and revoke access to individual Bugsnag projects.
All communications with Bugsnag servers are encrypted using industry standard TLS by default. This includes traffic between you and Bugsnag and between Bugsnag and integrations you have configured. For email Bugsnag supports TLS, mitigating eavesdropping and spoofing between mail servers.