Some say rest-easy, but at ClientSuccess we believe that success requires you to be on your feet. So, work hard knowing that your data is protected by ClientSuccess. To provide your team with powerful tools, insights, and analytics the ClientSuccess platform needs to access your customer data. We appreciate and embrace the responsibility of protecting your data and the implications of data security on our platform. Our primary goal is for you to succeed by helping your customers succeed and believe that that begins with protecting your data in a way that exceeds your expectations.
Our team has relevant experience
Our team includes people who’ve played lead roles in designing, building, and operating highly secure internet-facing systems, such as payment processing platforms, analytics, cloud services, and content distribution networks in previous startups and large, enterprise companies.
Our team is trained and committed
Every employee must agree to comply with the ClientSuccess security policy. We provide supplemental training and assistance on an ongoing basis as threats evolve and our practices change.
Our network is minimal and secure
We operate a minimal amount of network infrastructure and do not own or operate any servers on our premises, which we believe reduces our security risk in many ways:
- Simplified network security
- Avoidance of management challenges related to installed software
- Increased physical security
We host in world-class facilities
ClientSuccess runs on Amazon Web Services (AWS), an architecture trusted by enterprise-grade firms in the Fortune 100. AWS accepts responsibility for security which includes facilities, network, hardware, and the host OS. ClientSuccess ensures that the Guest OS, application software, and security controls run on the AWS stack.
ClientSuccess’ implementation on AWS includes the following approaches:
- Data Segregation—Logical segregation of each customer’s data in full
- Application Instance Isolation—Dedicated application instance for each customer
- IP-based Access—Control of access between software tiers at the firewall / IP level
- Pre-deployment Updates—Updated and validated machine images, patches, and configurations before deployment
- End User Usage Trends—Feature usage for every end user over time
- Logging, Auditing, and Alerting— Monitoring and tracking of instances for performance and security
We enable security features
ClientSuccess is built from the ground up to adhere to our rigid security standards. We’ve invested significant development efforts into building robust security features. Security not only comprises a major component of our product today, it will be a significant theme of our roadmap moving forward.
Key security capabilities of ClientSuccess include, or will include as applicable features require them:
- OAuth 2.0 protocol, the industry standard for HTTP authorization
- Additional levels of user validation to dramatically increase security levels
- Data encryption
- Fully encrypted data transmissions from customer repositories to the ClientSuccess
We follow best practices
At ClientSuccess we follow a number of best practices that improve our security posture. Here are a few examples:
- We have functioning, frequently used automation in place so that we can safely and reliably rollout changes to both our application and operating platform within minutes. We typically deploy dozens of times a day, so we have high confidence that we can get a security fix out quickly when required.
- All data sent to ClientSuccess is encrypted in transit. Our API and application endpoints are TLS/SSL only.
- We use technologies such as Spring Security, Logentries, NewRelic, and AWS Cloudtrail to provide an audit trail over our infrastructure and the ClientSuccess platform. Auditing allows us to do ad-hoc security analysis, track changes made to our setup and audit access to every layer of our stack.
- We use two-factor authentication whenever possible. We ask vendors to enforce two factor authentication in all our accounts. We review which accounts can access our systems and the permissions they have regularly.
- We have an incident response plan and educate all staff on security procedures and policies.
Client Success is SOC 2 Type 2 Designated
ClientSuccess has successfully completed its AICPA Service Organization Control 2 (SOC 2) Type 2 audit. The audit provides independent validation that ClientSuccess’s information security controls, procedures, policies, and operations are in accordance with SOC 2 standards relevant to security, confidentiality, and availability. This attestation further reinforces ClientSuccess’s leading position on security and compliance within the industry.
We are committed to data security. This audit provided a detailed review of our internal controls and how they impact security, processing integrity, availability, and confidentiality in how we process user's data. This designation is a clear indicator of our desire to build relationships that last with our customers, partners, and users.
Official Announcement: https://www.clientsuccess.com/news/clientsuccess-achieves-soc-2-type-2-certification/
We do not store payment details
ClientSuccess is not in the business of storing or processing payments. All payments made to ClientSuccess go through a third-party partner. Details about their security setup and PCI compliance can be made available upon request.