Security and Compliance represent key aspects of any product your team uses. Performance Leader is committed to securing access to your data, eliminating systems vulnerabilities and ensuring continuity of access.
Performance Leader is committed to maintain our ISO 27001 certification.
Performance Leader is designed to comply with all requirements stated by the GDPR.
Performance Leader uses an array of industry-technologies and services to protect your data against unauthorized access, disclosure, use, and loss.
All Attio Administrators undergo background checks and are routinely trained on security practices both during company onboarding and on a quarterly basis.
Security at Performance Leader is directed by Performance Leader's Head of Engineering and maintained by Performance Leader's internal Infrastructure Engineering team.
Performance Leader is committed to maintain an ISO 27001 aligned ISMS program.
Performance Leader is designed to comply with all requirements stated by the GDPR and the CCPA.
Performance Leader is a UK registered company and is registered with the UK Information Commissioner's Office.
Where possible Performance Leader makes tools available to our customers to allow them to meet their obligations to such legislation inside the platform.
We take vulnerability disclosures extremely seriously. Once disclosures are received, we rapidly verify each vulnerability contained within the report before taking the necessary steps to contain and remediate the issue.
Once verified, we will periodically send status updates as the problems are fixed and will endeavour to work with the reporter to coordinate public disclosure should they so wish.
Performance Leader has a well documented response process for the detection and resolution of Security Incidents.
The Attio Platform is hosted exclusively on Google Cloud Platform.
Google Cloud maintains both ISO 27001 certificates and SOC 2/3 reports which can be found here.
Datacenters used by Google Cloud Platform include extensive security measures built around a layered security model. These safeguards include:
More information about the physical security of these datacenters can be found in this Google Security Whitepaper.
Attio employees do not have physical access to any Google data centers, servers, networking equipment or storage media.
Attio is the assigned administrator of its infrastructure on Google Cloud Platform and only a small number of authorised Attio employees have access to configure this infrastructure. Where infrastructure configuration is done it is on an as-needed basis and requires two factor authentication.
Direct access to servers (such as SSH) is only done on an as-needed basis and uses detailed audit logging. SSH connections are protected using two-factor authentication and regularly rotated certificates.
Administrators connections to production servers are made over a private network.
Administration rights (including SSH, Database Access and Infrastructure Configuration) are tightly controlled and restricted to a very small number of our team.
Attio undergoes annual black box penetration testing by an accredited third-party agency.
Penetration testers are provided with a high-level diagram of application architecture and tests are run against our hosted production environment.
Information about any security vulnerabilities successfully exploited through penetration testing is used to set mitigation and remediation priorities. Customers on our Enterprise plan can request a summary of our latest penetration test findings by contacting their Account Manager.
Attio is committed to maintaining an ISO 27001 aligned ISMS.
Attio does not yet undertake third-party audits of our ISMS program.
Attio uses a combination of host-based signals, network-based signals, and infrastructure signals to provide Intrusion Detection and Prevention systems (IDS/IPS).
We use both signature-based security and algorithm-based security to identify patterns that could represent an attack method.
Our IPS strategy involves tightly controlling the attack surface, employing intelligent and layered detection controls at data entry points, and deploying technologies that automatically remedy potentially dangerous situations.
Attio does not provide customers with access to security event forensics but does continue to provide support during and after any unscheduled downtime.
Every part of the Attio platform uses automatically provisioned, redundant servers to protect against failure.
Servers are regularly taken in and out of operation throughout the day as part of our routine operation without affecting availability.
Attio keeps regular daily and weekly backups of data in multiple geographic locations on Google Cloud Platform.
All backups are stored in an encrypted form.
In the case of platform-wide production data loss we are able to restore data from these backups.
We regularly test our ability to restore our infrastructure from the backups we maintain.
We routinely verify the integrity of the backups that we hold.
Attio primarily serves traffic from a single geographic region spread across multiple availability zones.
In the unlikely event of a prolonged regional outage we maintain a documented procedure for provisioning our deployment environment in a separate region.
Attio has an extensively documented Incident Response process that includes documented procedures for Business Continuity and Disaster Recovery.
All customer data is sent to Attio via HTTPS using TLS 1.2 or above.
All Attio systems are configured to reject connections using TLS version below 1.2 or those using potentially insecure cipher suites.
Attio operates a zero-trust network meaning that all network traffic, even within our own network perimeter, is encrypted.
Attio regularly tests the availability and security of its SSL configuration using SSL Labs Reporting. The latest report can be viewed here.
All requests into the system are logged and monitored using a combination of rule and anomaly-based systems.
Attio allows customer's to access the data stored in Attio through several methods including:
All of the methods we provide to our customers for accessing their data ensure encryption in transit using TLS 1.2 or above.
Attio provides users with the ability to sign in using temporary passwords.
Temporary passwords are valid for one hour after they are issued and have several automated defences against brute force attacks.
Attio provides the option for users to add an additional layer of security to their Attio account using Time-base One Time Passwords (TOTP).
Once enabled Two-Factor Authentication applies to all authentication methods including Single Sign-On.
Attio allows users to login using their Google or GSuite for Business account.
Attio participates in the Google Security Assessment program meaning our Sign In with Google flow is assessed for Security and Privacy annually by a Google nominated third-party auditor.
Customers on our Business or Enterprise plans are able to enable SAML-based authentication.
Workspaces are optionally able to force all of their users to authenticate using SAML 2.0 to align with their own authentication requirements.
Attio provides a REST-ful API that allows our customers to access their data through integrations with other platforms.
API keys have been designed to be resistant to brute force attacks.
Customers are able to issue, modify, and revoke API tokens through their Workspace Settings page.
Attio uses a Continuous Integration and Continuous Deployment model which means all of our code changes are committed to a Source Code Repository, reviewed, tested, and shipped to our customers in a rapid sequence.
On a typical workday we will deploy between one and twenty versions of Attio to our customers.
Our rapid iteration development model significantly improves our response time to bugs, vulnerabilities, and security incidents.
Attio does not provide release notes to our customers for every version of the application that we deploy.
Attio believes that good security applies equally to our team as to our platform.
Attio maintains a comprehensive Malware Protection system backed by Malware Bytes and Apple GateKeeper.
Attio uses Fleetsmith for Inventory Management and Configuration.
All Attio endpoints use Full Disk Encryption, Screen Lock, Remote Wipe, and strong passwords.
Attio uses a documented Risk Assessment and Treatment process.
Attio uses a combination of Asset and Scenario based Risk Assessments.
All deployments of Attio go through peer review, automated testing, and an automated deployment process that updates the production environment.
Attio performs a risk management and treatment of all systems and applications on a regular basis.
Attio places the Availability and Confidentiality of our platform at the top of our priorities.
Attio maintains a comprehensive Incident Response Process that includes designated Disaster Recovery and Customer Communication plans.
We test all of our Incident Response Processes quarterly and throughly review our test results for gaps.
We update our Incident Response Process at least annually.
Attio maintains a comprehensive set of documented Security Policies in our company wiki.
Our policies are designed in accordance with ISO 27001 and are updated on an ongoing basis and annually for gaps.
Customers on our Enterprise plan with special compliance requirements can request access to a more detailed overview of these policies from their Account Manager.
Attio conducts Background Checks using the UK Disclosure and Barring service for members of our team that have Administrator access to our infrastructure.
Attio maintains a comprehensive internal Security Training program for our team.
All Attio employees receive security training upon joining the team and quarterly thereafter.
Members of Attio's engineering team receive regular additional training that covers secure development practices, such as the OWASP Top Ten, in addition to our internal policies.
Attio follows a CERN (Contain, Eradicate, Recover, and Notify) security incident response process.
Where a Security incident affects the Confidentiality of customer data Attio will contact the registered Administrators of the Workspace.
Attio maintains a public status page at https://status.attio.com which reports on operational issues.
Anyone can subscribe to updates via email from the status page.
Book a discovery meeting with us to explore your firm’s approach to building a sustainable high performance cultureWatch a 3-minute demoContact us