Skip to content

Commit 48667ce

Browse files
authored
Merge pull request 0xPolygon#353 from jabraham-polygon/security
Security - add ISO detail; non-material edits/formatting
2 parents a8ac782 + 64dfdca commit 48667ce

File tree

8 files changed

+24
-23
lines changed

8 files changed

+24
-23
lines changed

docs/security/contact.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
# Contact us
2-
Polygon Labs Security Organization is happy to talk to you. Feel free to reach us out at:
2+
Polygon Labs Security organization is happy to talk to you. Feel free to reach out to us at:
33
security@polygon.technology

docs/security/governance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Polygon Labs' security program is designed and implemented following the ISO/IEC 27001 standards, an internationally recognized framework for managing and securing sensitive information assets. By adhering to these standards, Polygon Labs demonstrates a strong commitment to the protection of its clients' and employees' data, ensuring that confidentiality, integrity, and availability are maintained at all times.
22

3-
The ISO27001-based security program at Polygon Labs involves the establishment of an Information Security Management System (ISMS), which is a systematic approach to managing sensitive information and minimizing risk. This includes conducting regular risk assessments to identify, analyze, and evaluate potential threats and vulnerabilities, as well as implementing appropriate security controls and measures to mitigate those risks.
3+
The ISO 27001-based security program at Polygon Labs involves the establishment of an Information Security Management System (ISMS), which is a systematic approach to managing sensitive information and minimizing risk. This includes conducting regular risk assessments to identify, analyze, and evaluate potential threats and vulnerabilities, as well as implementing appropriate security controls and measures to mitigate those risks.
44

55
In addition to risk assessments, Polygon Labs' ISMS incorporates a comprehensive set of policies, procedures, and guidelines that cover various aspects of information security, such as access control, incident management, and business continuity planning. Employee training and awareness programs are also an integral part of the security program, ensuring that staff members understand their roles and responsibilities in safeguarding the organization's information assets.
66

docs/security/hr.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,10 @@ When an employee exits the company, HR changes their status in our HRIS system,a
66

77
### Security Awareness Training
88

9-
Polygon utilizes a SaaS platform to provide an integrated approach to email and security awareness training for all of our employees. All employees are required to pass the training during their first weeks of employment. The key features of the platform are::
9+
Polygon utilizes a SaaS platform to provide an integrated approach to email and security awareness training for all of our employees. All employees are required to pass the training during their first weeks of employment. The key features of the platform are:
1010

1111
- **Industry-specific modules** - Reinforce critical concepts mapped to key industry standards and security frameworks, including ISO, NIST, PCI DSS, GDPR, and HIPAA
1212
- **Real-world assessment** - Safely test employees on real-world threats with de-weaponized phishing attacks
1313
- **Comprehensive reporting** - Track primary indicators of risk across the awareness training platform and take remedial action with easily discernible user risk scores
1414
- **Integrated risk insight** - Leverage real-world click behavior to identify high risk users
15-
- **Effortless administration**- 12-month programs with rapid deployment.
15+
- **Effortless administration** - 12-month programs with rapid deployment

docs/security/infrastructure.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,14 +10,14 @@ The monitoring infrastructure was developed both in-house and by vendors as need
1010

1111
### Multisig Security
1212

13-
Specific requirements are followed by any Polygon Labs employee that is a signer on a corporate multisig contract. Multisig contacts are corporately owned and control treasury assets or smart contract deployments. They consist of Safes (previously Gnosis Safes) and other smart contract multisig implementations. Hardware wallets are hardware-based cold storage such as Trezor or Ledger devices that store private keys and enable signing multisig transactions offline. Signer multisig requirement include:
13+
Specific requirements are followed by any Polygon Labs employee that is a signer on a corporate multisig contract. Multisig contacts are corporate-owned and control treasury assets or smart contract deployments. They consist of Safes (previously Gnosis Safes) and other smart contract multisig implementations. Hardware wallets are hardware-based cold storage such as Trezor or Ledger devices that store private keys and enable signing multisig transactions offline. Signer multisig requirement include:
1414

15-
- **Hardware Wallet:** Polygon requires Cold storage from an accepted vendor dedicated for company official use only and secured by a PIN
15+
- **Hardware Wallet:** Polygon requires cold storage from an accepted vendor dedicated for company official use only and secured by a PIN
1616
- **Hot Wallets:** Hot wallets are not allowed for use on Polygon multisigs
17-
- **Corporate Workstation:** Signing must be performed from a company system managed by our enterprise mobile device management (MDM) platform complete with anti-virus (AV) and endpoint detection and device (EDR).
17+
- **Corporate Workstation:** Signing must be performed from a company system managed by our enterprise mobile device management (MDM) platform complete with anti-virus (AV) and endpoint detection and device (EDR)
1818
- **Clean Key:** All signers are required to create a clean key that has never been exposed to a hot wallet
1919
- **Mnemonic Storage:** Polygon mandates safe storage of mnemonic passphrases and provides guidance to its employees
20-
- **Secure Communication:** All multisig signing events are coordinated using Polygon’s accepted communication protocols for multisigs.
20+
- **Secure Communication:** All multisig signing events are coordinated using Polygon’s accepted communication protocols for multisigs
2121

2222
**All corporate multisigs are monitored 24/7 by the Polygon security team.**
2323

docs/security/operations.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,4 +19,12 @@ When an incident is identified the security operations team performs triage and
1919

2020
Polygon Labs carefully considers when, how and who to communicate with during incident response. Impacted stakeholders are sent notifications in a timely manner to ensure they can take reasonable steps to protect their information if necessary. Polygon Labs also makes every effort to work with law enforcement to the degree required by the laws of the jurisdictions that we operate in, which may be different depending on the nature of the cyber security incident.
2121

22-
In order to ensure the incident response process remains relevant, we conduct regular incident response exercises if no real security incident has occurred after a given period.
22+
In order to ensure the incident response process remains relevant, we conduct regular incident response exercises if no real security incident has occurred after a given period.
23+
24+
**Authentication & Access Control**
25+
26+
Polygon Labs establishes standards for authentication & access control in its information security policy and information security standards documents.
27+
28+
To ensure the security of our corporate systems, all employees must adhere to strict password requirements. Passwords should be changed regularly according to our guidelines and two-factor authentication is mandatory for accessing sensitive systems. Default, shared, or easily guessable passwords are strictly prohibited.
29+
30+
Polygon Labs performs entitlement reviews for sensitive systems on a yearly basis. Where applicable and available, systems are accessed via single sign-on (SSO).

docs/security/overview.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,4 @@
1-
The purpose of this document is to provide an overview of the security measures and capabilities of Polygon Labs.
2-
3-
At Polygon Labs, ensuring the security of our information systems and safeguarding the sensitive data of our clients and employees is of paramount importance. We prioritize security throughout every facet of our operations, from implementing robust security policies and guidelines to adopting industry best practices, such as ISO27001 as a baseline for our security program and adhering to the OWASP recommendations for secure software development. We invest heavily in continuous security training for our employees, keeping them informed of emerging threats and equipping them with the necessary skills to protect our digital assets. In addition, we embrace a proactive approach by incorporating security by design principles and utilizing state-of-the-art security tools to detect and mitigate vulnerabilities at every stage of the development lifecycle.
1+
At Polygon Labs, ensuring the security of our information systems and safeguarding the sensitive data of our clients and employees is of paramount importance. We prioritize security throughout every facet of our operations, from implementing robust security policies and guidelines to adopting industry best practices, such as ISO 27001 as a baseline for our security program and adhering to the OWASP recommendations for secure software development. We invest heavily in continuous security training for our employees, keeping them informed of emerging threats and equipping them with the necessary skills to protect our digital assets. In addition, we embrace a proactive approach by incorporating security by design principles and utilizing state-of-the-art security tools to detect and mitigate vulnerabilities at every stage of the development lifecycle.
42

53
## Commitment to security
64

docs/security/reports.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,12 @@
1-
Polygon Labs periodically assesses the security its products and applications through extensive internal testing and external (public & private) engagements, such as code reviews, security audits and penetration testing. All products and applications have been assessed multiple times to date. Security assessments continue as the ecosystem matures.
1+
Polygon Labs periodically assesses the security of its products and applications through extensive internal testing and external (public & private) engagements, such as code reviews, security audits, red team assessments and penetration testing. All products and applications have been assessed multiple times to date. Security assessments continue as the ecosystem matures.
22

3-
Following information relates to the latest available (and public) external assessments:
3+
Following information relates to the latest available (and public) external assessments and certifications:
44

5-
## ISO27001
5+
## ISO/IEC 27001:2022 Certification
66

7-
- ISO27001 certificate: https://www.schellman.com/certificate-directory (search for Polygon Labs)
7+
- Polygon Labs was awarded ISO 27001 certification in March of 2024
8+
- **Certificate:** https://www.schellman.com/certificate-directory (search for "Polygon Labs")
9+
- **Scope:** `The scope of the ISO/IEC 27001:2022 certification is limited to the information security management system (ISMS) supporting the Polygon Labs' business of developing blockchain scaling solutions, which includes personnel, policies, procedures, standards, systems, endpoint devices, applications, data, and controls, and in accordance with the statement of applicability, version 1.2, dated October 11, 2023.`
810

911
## Portal
1012

docs/security/vulnerability.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,3 @@ Vulnerabilities are sent to a centralized issue and findings tracker ensuring th
55
Polygon Labs maintains open communication channels with vendors and security researchers, enabling us to stay informed of newly discovered vulnerabilities, patches, and updates. This collaboration significantly contributes to maintaining a secure environment by ensuring that systems and applications are up-to-date and protected against known threats.
66

77
All these activities, and others, are part of our robust vulnerability management lifecycle, which effectively reduces the risks associated with security vulnerabilities, strengthens the overall security posture, and maintains the trust and confidence of our clients, partners, and employees.
8-
Authentication & Access Control
9-
10-
Polygon Labs establishes standards for authentication & access control in its information security policy and information security standards documents.
11-
12-
To ensure the security of our corporate systems, all employees must adhere to strict password guidelines. Passwords must be a minimum of 12 characters in length and contain at least one uppercase letter, one lowercase letter, one numeral, and one special character. Passwords should be changed every 90 days and two-factor authentication is mandatory for accessing sensitive systems. Default, shared, or easily guessable passwords are strictly prohibited.
13-
14-
Polygon Labs performs entitlement reviews for sensitive systems on a yearly basis. Where applicable and available, systems are accessed via single sign-n (SSO).

0 commit comments

Comments
 (0)