Skip to content

Commit de91473

Browse files
committed
reviewed architecture low-level section
2 parents 5863881 + 16d2e2d commit de91473

File tree

21 files changed

+425
-25
lines changed

21 files changed

+425
-25
lines changed
240 KB
Loading

docs/index.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ hide:
5252
</div>
5353
<p class="feature-paragraph">Deploy a dApp on the widely adopted Polygon Proof-of-Stake protocol, an EVM-compatible environment optimized for high throughput and low transaction fees.</p>
5454
</a>
55-
<a href="cdk/get-started/quickstart/deploy-stack" class="flex-card-item w-inline-block">
55+
<a href="zkEVM" class="flex-card-item w-inline-block">
5656
<div class="product-list-item-header">
5757
<div class="feature-card-heading">Polygon zkEVM</div>
5858
<div class="arrow-embed w-embed"><svg xmlns="http://www.w3.org/2000/svg" display="block" width="100%" height="auto" viewbox="0 0 16 17" fill="none">
@@ -100,7 +100,7 @@ hide:
100100
</div>
101101
<p class="feature-paragraph">Deep dives only. Further your understanding of Polygon scaling technology.</p></br>
102102
</div>
103-
<a href="learn" class="flex-card-item w-inline-block">
103+
<a href="innovation-design" class="flex-card-item w-inline-block">
104104
<div class="product-list-item-header">
105105
<div class="feature-card-heading">Innovation & design</div>
106106
<div class="arrow-embed w-embed"><svg xmlns="http://www.w3.org/2000/svg" display="block" width="100%" height="auto" viewbox="0 0 16 17" fill="none">
@@ -127,7 +127,7 @@ hide:
127127
</div>
128128
<p class="feature-paragraph">Introducing the multi-chain, multi-transaction Polygon Agg Layer; what it is and how it works.</p>
129129
</a>
130-
<a href="./learn/plonky" class="flex-card-item w-inline-block">
130+
<a href="./innovation-design/plonky" class="flex-card-item w-inline-block">
131131
<div class="product-list-item-header">
132132
<div class="feature-card-heading">Plonky 2 & 3</div>
133133
<div class="arrow-embed w-embed"><svg xmlns="http://www.w3.org/2000/svg" display="block" width="100%" height="auto" viewbox="0 0 16 17" fill="none">
@@ -136,7 +136,7 @@ hide:
136136
</div>
137137
<p class="feature-paragraph">Keep up with our latest cryptographic developments with the Plonky 2 & 3 libraries.</p>
138138
</a>
139-
<a href="learn/polygon-protocols" class="flex-card-item last-item w-inline-block">
139+
<a href="innovation-design/polygon-protocols" class="flex-card-item last-item w-inline-block">
140140
<div class="product-list-item-header">
141141
<div class="feature-card-heading">Polygon protocols</div>
142142
<div class="arrow-embed w-embed"><svg xmlns="http://www.w3.org/2000/svg" display="block" width="100%" height="auto" viewbox="0 0 16 17" fill="none">
@@ -206,7 +206,7 @@ hide:
206206
<p class="home-section-subtext">Are you ready to start building?</p>
207207
</div>
208208
<div class="flexbox">
209-
<a href="cdk/get-started/quickstart/deploy-stack" class="home-feature-card w-inline-block"><img src="img/home/polygon-icon.svg" loading="lazy" alt="" class="feature-icon">
209+
<a href="cdk/build/quickstart/deploy-stack" class="home-feature-card w-inline-block"><img src="img/home/polygon-icon.svg" loading="lazy" alt="" class="feature-icon">
210210
<div class="feature-content-wrapper">
211211
<div class="feature-content-name">Polygon CDK: Deploy a local test rollup</div>
212212
<div class="arrow-embed w-embed"><svg xmlns="http://www.w3.org/2000/svg" display="block" width="100%" height="auto" viewbox="0 0 16 17" fill="none">
@@ -217,7 +217,7 @@ hide:
217217
<a href="zkEVM/how-to/using-hardhat/" class="home-feature-card w-inline-block"><img src="img/home/polygon-icon.svg" loading="lazy" alt="" class="feature-icon">
218218
<div class="feature-content">
219219
<div class="feature-content-wrapper">
220-
<div class="feature-content-name">Polygon zkEVM: Deploy a smart contract to the Goerli testnet</div>
220+
<div class="feature-content-name">Polygon zkEVM: Deploy a smart contract to the zkEVM Cardona testnet</div>
221221
<div class="arrow-embed w-embed"><svg xmlns="http://www.w3.org/2000/svg" display="block" width="100%" height="auto" viewbox="0 0 16 17" fill="none">
222222
<path d="M9.98805 5.70133L3.41071 12.2787L4.58922 13.4572L11.1666 6.87976V12.2013H12.8333V4.03467H4.66665V5.70133H9.98805Z" fill="currentColor"></path>
223223
</svg></div>
@@ -236,7 +236,7 @@ hide:
236236
<div class="flexbox items-4">
237237
<a href="pos/how-to/bridging/" class="home-feature-card w-inline-block"><img src="img/home/polygon-icon.svg" loading="lazy" alt="" class="feature-icon">
238238
<div class="feature-content-wrapper">
239-
<div class="feature-content-name">Polygon PoS: Deploy an existing contract</div>
239+
<div class="feature-content-name">Polygon PoS: Bridge tokens and send interlayer messages</div>
240240
<div class="arrow-embed w-embed"><svg xmlns="http://www.w3.org/2000/svg" display="block" width="100%" height="auto" viewbox="0 0 16 17" fill="none">
241241
<path d="M9.98805 5.70133L3.41071 12.2787L4.58922 13.4572L11.1666 6.87976V12.2013H12.8333V4.03467H4.66665V5.70133H9.98805Z" fill="currentColor"></path>
242242
</svg></div>

docs/innovation-design/index.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,14 @@ hide:
3838
</div>
3939
<p class="feature-paragraph">Driven by innovation, the Polygon type 1 prover is fully Ethereum equivalent.</p>
4040
</a>
41+
</div>
42+
<div class="grid-item">
43+
<a href="./security/overview">
44+
<div class="product-list-item-header">
45+
<div class="feature-card-heading">Polygon security</div>
46+
</div>
47+
<p class="feature-paragraph">Polygon security, bug bounties, and more.</p>
48+
</a>
4149
</div>
4250
<div class="grid-item">
4351
<a href="./plonky">
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
## Immunefi
2+
https://immunefi.com/bounty/polygon
3+
4+
https://immunefi.com/bounty/polygonzkevm/
5+
6+
## Hexens
7+
https://r.xyz/program/f86864f2-8e7b-443a-84fe-cc0925f06221
8+
9+
## HackenProof
10+
https://hackenproof.com/polygon-technology/polygon-pos
11+
12+
## HackerOne
13+
https://hackerone.com/polygon-technology
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
Polygon Labs security organization is happy to talk to you. Feel free to reach out to us at:
2+
security@polygon.technology
Lines changed: 108 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,108 @@
1+
Have you discovered a security flaw or CVE related to our technology? Please notify us before informing the outside world, so that we can take action. This is known as ‘responsible disclosure’.
2+
3+
Email us at security@polygon.technology, and use the PGP key below to encrypt any sensitive data.
4+
5+
If you are looking for a reward or bounty related something you personally discovered, submit your request to one of our [bug bounty programs](bugbounty.md).
6+
7+
## PGP public key
8+
9+
```
10+
-----BEGIN PGP PUBLIC KEY BLOCK-----
11+
Version: Keybase OpenPGP v2.0.76
12+
Comment: https://keybase.io/crypto
13+
14+
xsFNBGUT/qEBEADieeiOhgfHn8KtAz+r9zAig3aiBlj2CxBwATVYUK9jDm+4SdHu
15+
godygYTPfhToHlRv/yptDUNRIHbNeqg1iZNcsgi0+uSZ8fvmyfSbnZC3WMJSUE8z
16+
d+C9h6/Oh50YfHbPCUu3UtU4BWzhTrvhxdPcwq4epsguiolDEP4Um8B8iCbbfJGw
17+
zbguT8o4qg/EYyEI6fTtnAOHx6489GD/7b3WCgrVcy5s6XSXpw3X+eQE8B2nbWTg
18+
Cahn6I5CPO/ZUhQ+Ma/3uRcLcQzhLC3IgTzjdTYHAbRgKurTPllZrOOAh4/FG4rY
19+
XzQRJ9DtxSvnTZXXlV5GE4Grfut9sHAVk/dN9CYMlgvohp5gutH+T9sUO2NEAlMu
20+
S0slJctr0RCs+9Nl60DxtvBz3lMgJksiS/HugE34gEcVPr7QfklHXlqsnhbDJPNo
21+
U+DQdCyondqmWlXYhXYLMea70nKA6YyINcavoexb5DGn+Gy2cf+3co4prF/QblBr
22+
eKy2MBGPvjXD/GC2QOS1YephQwICfFk+VoE9Gk3gIu6yXKEp+nteUGxgvCRuYF0Z
23+
HvixeNAvGchdxiCFoH6fMtrvutW0QOjGKLJu1p6aFkWR93Dd7gduJupwlt/RYDNG
24+
7stxUZu9pVbL9mI8KPkGdOBlC8yPjCvWBeQwmCSMt1hPG1A1plPNSDKFywARAQAB
25+
zS5wb2x5Z29uLXNlY3VyaXR5IDxzZWN1cml0eUBwb2x5Z29uLnRlY2hub2xvZ3k+
26+
wsF6BBMBCgAkBQJlE/6hAhsvAwsJBwMVCggCHgECF4ADFgIBAhkBBQkAAAAAAAoJ
27+
EIXYxnZoYpdPnSgP/0fcF7sksnjlgVHSRp+w3veWbPHDphpWZC4mhRDPHE77Elem
28+
25kWB3k75KW5JhH/pCtimO5mfM8G2WKSH5rQ1FU1t58vZfH6iEJWYzEAObzWfvak
29+
QLXCJ3LV4AKAomIMNp7m/+ZtoD5qTE4HICITJFIVLcpu51AIhZuC757ivujuqLUK
30+
PhzdDCC0a6JSlFunqi50ZBAEgdAuDgl0NHpYf09r3T5tw/0ByvBsjqxLYhe/Aazj
31+
yq5JVa6nV5ka8B/tIeP6kWEs1a82+RgyKHns+O4OFmZN7QxURXQHmaB/+tLoSNth
32+
PBZs/W8GGICa3MDrlyDkCl+b+WleIGlDbTyOzk7FRq39OBo0VelIxML51I7wQjw8
33+
07dt3bzO+c2vo87dXIOAXFbxHhL/nJyI83XwQ1hCwSRutb7P8j/VveFCfkIw6e/h
34+
3lgW5lSgJUg3TSon+2RJaF+STCV1edTYM1/YYtqiIJidyC/McIUZTH5oMLNbECTy
35+
gF9dfk15glIa6d+26zhw+q/jmx534JMdyv6a4n9WvE/diDCq0woEetoMfF95qP0j
36+
F3qqQvw0yhMmMg8sx+7br40SEFbeEG5SoIVAuMQtxBDCQzaEuLtUjX3iJqv9aP1V
37+
vqyXZqJjjLZEm9BryBWsmYT/5UHMegcElHkcEYRIG8BSyMhklNzXTtUUbzsVzsFN
38+
BGUT/qEBEADAB1oI85wHe84DNKU95lzuZ/DZx8sbTT1GE+N4scgxAd8knJLof/a+
39+
lU7yxuVON0iEnq08r1LHI5cEsdAWu8v8Yv0hbXR3jzryZXIjkEi6mXhujzzw/Ghz
40+
ACXvwS6RuYNZEemDg/cYN6N8i/olGEZNuDmKbD9nVoy0eEmefXD/JQGiLFJ7yvei
41+
ou7vwHP6LxzBkcb/g4n4i1TBLGqeJJGtQrtwVlwrD6NE3/ERO8U7biZ3TD6jLBWm
42+
fWSI5IYN+4PUrCttLGri+TOwtVs1rl2bBMaj+InMm9bj5WjJF+XVKZQMoZln+Qn2
43+
AkqT2PR9PaqrxCEuPehc/Iyfr1f4Fy3xHxkU5trh3e9TiAvGNQp8Pt1N0SAqZwu6
44+
zg+0Nfh2ep/7SEeKpNEH7vj36DJoCXWaLuiD1GFW2QyyNslGoH/2+T0Oow03l5cA
45+
H45SEXyezzHxUKtjv5/EFbIFsPKbOGqqZqxc+X4JHbU+kCHzVL9XMak31uBZ1vD+
46+
2oLWSbsnoCjHYyiJBhwsJ0NpIxfYQdTzQFtTk3vQACCF8BTMJ0+s+MAeFFeJC8by
47+
Ew6MXpHGLjONIbu659kteEojuJIGGdgYTKlF5/0zZdVtz8MqvSio1baZMhw9V9HI
48+
nS0zcWWGH94/R0/lkoYqeEbUJ4bzMHI/YHB70hL1lV3CaVJ7eV2VYwARAQABwsOE
49+
BBgBCgAPBQJlE/6hBQkAAAAAAhsuAikJEIXYxnZoYpdPwV0gBBkBCgAGBQJlE/6h
50+
AAoJEAZbSlMNXOyEN1YQAIs/t82MftZrLt6UKOlyKMG0mwXey/NTWYNs34J/+Eqj
51+
fY9f5PVHQmpm4keuYGvrqDAVXxqmFEgsbRR62QBSDIX1RtZnjZ3K0cfI6hDNgQiE
52+
VWlDLaXIB+ewQBUKynjMP2blJCrT3/THcQVqhNRP+0I07Qt+UMOTfxJJL92sgsEW
53+
lm4b+5+0BZQDYApA7LzSeB3yOqWCBdBxYrVRFOAGE8WuorawaTJPVdXvuH1OrM7z
54+
9SrfpANjX0/Azs4QoRzH3w0zKn03fJlLZ2CT8j+ZvIW3/rXFYQ8yt8pg2Fs6Fb5X
55+
PzFWuboAbnCmcTvGIW+05FeGcOqS5qQIPt4oMyanQ29/SLhnWule6KP3JjmRo1gZ
56+
kCFgkCKpO36kw9Yd6Anuiau70Y+rOKQNRxD03DdDvQclAvTgOIej+fgFiC/nrM8q
57+
D05UdOaWD64ci2gb6OP+YyLeWfj2S2EKnBGCLwODIu10o9SyJ+DGIYn1cdjlAw3J
58+
cVed3hBsMkE2D1+HAA6IpfqDr17hRxFYGEvmEaOI8LlCKuLbjkbPUHsVR0IKNn/t
59+
rE0sL6ZI2tBLIBX6C7fJBds4JwO+ClM5pOVaJrDKUvWSW7RZnejFOV3+TkHX3J5T
60+
CiFzBUcoWncNAg6ikcRLPcNNbfV1HcY3AGqQgW29TowbgE+donrJJU6qvR0vsQp6
61+
LiMQAMvEG6MqiJN6bLeWs2Sh87FZIgeacFYOVteAwXFRPgYYOYEPaKjtkAGxOTe2
62+
AzvGnQY8Tu2jsJN2URPYwWrhEhX16jqOc+mCFRQBy4aNczMw2au8bhylG323mfxB
63+
ODzMKKXmBCFYSYSqIy86nrKgLoXWKmVOkfhRRboDoeBbsbH78P7LIYpODNZfbuu3
64+
JlhJb5yTEbxdoqmc8af07YVzNi2wYemi0NWxhj2gOjwR7l24hKw9w++ILuiymCHw
65+
z/QE1myDAI1aLoF+laA8vN929FkW7YQ7IEJhvdlCWY57bkwZKrBysth7Gwc8EEf5
66+
Nt/9d2CoU2w9nRkg0w40ysOXDmHOoJ3vNK+6U0egZJ2qmqX77QSuKgVlKPjTdTjB
67+
4dg2oqjfPyKFGi8yBgU7p4SHF8iTpQsUlMR1WtkVApUDsRhHmaxBvwxRmXL7Q+Zi
68+
SmD9YW4/gG9MB4zvQzHXIKjyrWjQ8VtNqWy8mXpW4UbTC4ao/VRGtvKC6lE8z4Wm
69+
WD0ByLEAyTlxZZpl8EOppNStlnU/FvopSAc8tf+1GeAW5alqlx779k4zOmyAstw5
70+
DqB86JFVJ6Q1VD4Z3DMUj1lXjmVl9FYbpaGuyiBrVVE6+b6+n5/Vd7MxzigpaHEl
71+
LYZgB/Wh+XOABv1JUwIVT+J+6fJXw6rnFfnoXYW40Yr9k9j0zsFNBGUT/qEBEADC
72+
w4vhyYyLemG7AWiQYP7SD4v20gxZdf3J9bKko25s7iEerP1t3lKw2FjUNwH3ePcH
73+
8MJnmOkHt3R+nNXlN90ZFkI72QxZBttQfCxP8hmuGrJ1T2rE/DBNI0msFaomS4yH
74+
3CLMHn6SWyUxaz0mRkb5nhgfTh3L4Lr99HPR8wYBNkdqLzzlCRs9fzO5Ib4rasNl
75+
S5UF93C7O5LP17Q0AEwJJk1h8rn/2W9vwew5upR09Xu2kRZxTwhJgn9CQCtycyNu
76+
kLUjAzdF9QPTPKr2KsLvM5V51oQBQjffcNKmUy/wrVcEIROaYjTW3nYDzvraB/rY
77+
t9uWgbFBKC2NaZdA6488WIMfnhDf6MAJ9fTL7X5bdo2Gu0BrlDK9+8UV2xEHhs8W
78+
z0D6AiLjS9tDkQSIv8JA/lhu7KD6sCAXidHwa3sBr1mI1vut2VW3lHrrccBspvad
79+
+4S1AqTUnNo8NdOBGCk0UXkuhYkBko/wmYuF2AMxGnLGm3gogLMwGDORLcb53dYf
80+
Y+Hff98KcIdMMrQI4njEPsS32Boj/Vmq1aSVry3UqbGaqAoeD2de6uNStE21YQ+L
81+
L4+WFfdFV6/DhggpxqcXFC9CumqqaABhGbgPb81JJXH0GQtPriE89sbOAzLpnEcD
82+
OW3eaf69hhwn3wItJAwxNMnm/LAJTFLRwrWF5411fQARAQABwsOEBBgBCgAPBQJl
83+
E/6hBQkAAAAAAhsuAikJEIXYxnZoYpdPwV0gBBkBCgAGBQJlE/6hAAoJEGvxxkyI
84+
0skB/jwP/iFfYseztT4d73hg5+zMTNDD4C2KQHwKcChL95p9ihc3VCrlRZyrEV8k
85+
hQ5GVb3pHaaNs2FCM71lWx7OQsW+I5Ki6Kz6cgwQXi4Uojq59gxs1pX1MDMzhK6C
86+
C877i4Mm/3IatXTnqGBezIjXeJnF9TFoDRjDSqybPXaDkE4THyINmQ0jFEf6u/uB
87+
7BzrZonLgC6JrrrqYeuwRV2XRNDLeu4hdlvy6HlzfsNT00R5hDhWaAcx9OkBmIiB
88+
udkURWNtPTlFZqrg+H0kOrlpGKanJXh89CwXuXqb72HIuQlJq//KROIdo3z+a2Pb
89+
DX7/cZwY79AVUVsfj3HOk2BeCAsczR/djxhfXRc84zMf0hTQXHCpy6ICIghBVvx5
90+
CA9iZZm6mtjlzv42Yl5NLcKiDf/ItKa5/GfjS9PVRsh55a8zxh6T8oWWZ0ZiIJw/
91+
VMmA+DRYqsv9F83v0QiaiJhwCvmLM/f6ipuxocG5z0FuG2vrCnl+CNhi9bulqLuo
92+
2Pl/H1VTnod7ez4cGu+a9943836HpESqhxBOLxmwhCd5chorlgKR2ihCbPZDuVPN
93+
baOIgul69hUUumZUVYFD22oKqZvbpjmGtvGdSrC8FrraZ0iXnhseT2efJdAUELIg
94+
sZ9kgy1RG9VV3AQJ5cBTQswtlCzzyEJpyZi0m6jL3VcHullHEf8LAhwP/1y5bEDl
95+
3EJapzt2/OyK4/kBUawHhiQlHaKXG6lXabB3dd2RGhWzicSm3UVWUmj8tfBnzX1Y
96+
EvpshbWLgWNHrCIVRmNizav3ucBRAx9q1m38l2GsnhjpHwfw8r4JjQWI5QjaJap9
97+
tXGa3QmxAaBdJwWTorA4ljHczLNx864r5g9dvKM0ZlN40/gsA8hwkSFUKVeE1Bpv
98+
n3lGI4JhIS+UkiVCY898iWh91Y6ejfuwX7INs8+wbcl5siCJ/OZyFG3XMsBpHN2f
99+
d2LJEF+/NB9id+QUcmfQ5iVYrAEs0ijdsfJWhnQ04ey8Y4eBSc4R/60xBjMC1j9S
100+
3aYRoKZ2BwFnBO03jWzJ+0diFI0IpptwxjpxZz94nHP28yzZo3yE7f39Yzxw4npm
101+
ShHGXLZY/KxmlRRK2vy5aEBTulVfPRfmviIhhOBB1D6L6GKTMrNKa6rhKu2G9LnS
102+
ein+koIWj0cDrX70HVDTB3h7O8+He28585v3vk857wtRQlQsBBg7uxhVRsfeB6hr
103+
dRFO6MFchft3GAyQ+aqu9/7yz/wtiUyUDI8xzM20YasGWI4ZnphY1URU2l21mQpO
104+
I+LkrR21rOViAoGmcaHFSjv5Jp7jJjy6OXtJpIPV9u6qC8iRYCLpwErGSZzDZiiS
105+
67X82D4gEsDLNjvjV4l7cn+CenuCWV+WFAOE
106+
=dn2w
107+
-----END PGP PUBLIC KEY BLOCK-----
108+
```
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
Polygon Labs’ security program is designed and implemented following the ISO/IEC 27001 standards, an internationally recognized framework for managing and securing sensitive information assets. By adhering to these standards, Polygon Labs demonstrates a strong commitment to the protection of data; ensuring that confidentiality, integrity, and availability are maintained at all times.
2+
3+
The ISO 27001-based security program at Polygon Labs involves the establishment of an Information Security Management System (ISMS), which is a systematic approach to managing sensitive information and minimizing risk. This includes conducting regular risk assessments to identify, analyze, and evaluate potential threats and vulnerabilities, as well as implementing appropriate security controls and measures to mitigate those risks.
4+
5+
In addition to risk assessments, Polygon Labs’ ISMS incorporates a comprehensive set of policies, procedures, and guidelines that cover various aspects of information security, such as access control, incident management, and business continuity planning. Employee training and awareness programs are also an integral part of the security program, ensuring that staff members understand their roles and responsibilities in safeguarding the organization’s information assets.
6+
7+
Polygon Labs has a security team led by a CISO reporting to founders.
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
Polygon Labs supports onboarding and offboarding service providers by following a process that begins with each service provider receiving a preconfigured laptop that auto enrolls in one of our Mobile Device Management (MDM) systems. MDM supports control of application usage and enforces security policy requirements on approved operating system versions and patch requirements. User access to shared services and Polygon Labs-approved SaaS tools is secured by providing the least amount of privileges required for a service provider to perform their tasks. Privileges are role based and given to each service provider based on the functional team they are assigned to.
2+
3+
Polygon Labs uses single sign-on technologies to automate the administration of user access and permissions across all its SaaS tools. Automating the provisioning and removal of users’ access privileges limits the risk of human error and supports efficient auditing procedures.
4+
5+
When a service provider exits the company, HR changes their status in our HRIS system, automatically removing their access to our SSO integrated SaaS platforms, and IT is immediately notified to initiate the wipe and recovery of their corporate system.
6+
7+
## Security awareness training
8+
9+
Polygon Labs uses a SaaS platform to provide an integrated approach to email and security awareness training for all of our service providers. All service providers are required to pass the training during their first weeks of service. The key features of the platform are:
10+
11+
- Industry-specific modules: Reinforce critical concepts mapped to key industry standards and security frameworks, including ISO, NIST, PCI DSS, GDPR, and HIPAA.
12+
- Real-world assessment: Safely test service providers on real-world threats with de-weaponized phishing attacks.
13+
- Comprehensive reporting: Track primary indicators of risk across the awareness training platform and take remedial action with easily discernible user risk scores.
14+
- Integrated risk insight: Leverage real-world click behavior to identify high risk users.
15+
- Effortless administration: 12-month programs with rapid deployment.
16+
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
## Polygon network infrastructure security
2+
3+
Polygon Labs has developed network infrastructure via smart contracts that automatically transfers assets to-and-from the Ethereum blockchain for both the Polygon PoS network and Polygon zkEVM scaling solution. This infrastructure implements a lock-and-mint architecture which results in assets being locked by the smart contract implementations.
4+
5+
On behalf of the Polygon community and broader industry, Polygon Labs has implemented certain monitoring features over the network infrastructure to enhance security. Much of the security efforts noted here are rigorously applied to network infrastructure, including risk management, secure software development practices, auditing, vulnerability management, CI/CI, on-chain monitoring, and bug bounties.
6+
7+
## Monitoring
8+
9+
The on-chain infrastructure is monitored for real-time events as a way to augment the application security efforts associated with software development (i.e. threat modeling, code auditing, library and supply-chain risk, and bug bounties). The real time monitoring includes both on-chain machine learning models to detect unknown threats in real-time, as well as empirical rule-based algorithms to capture known adversarial or error scenarios.
10+
11+
The monitoring infrastructure was developed both in-house, and by vendors as needed, to augment our capabilities in specific analysis areas. Any adverse events detected by our models and tools are evaluated, triaged and, if necessary, escalated to the proper team for further analysis. The monitoring process is integrated with our enterprise incident response process.
12+
13+
## Multisig security
14+
15+
Specific requirements are followed by any Polygon Labs employee that is a signer on a multisig contract, which are used for various security reasons. Multisigs consist of Safes (previously Gnosis Safes) and other smart contract multisig implementations. Hardware wallets are hardware-based cold storage, such as Trezor or Ledger devices that store private keys and enable signing multisig transactions offline. Signer multisig requirements include:
16+
17+
- Hardware wallet: Polygon Labs requires cold storage from an accepted vendor dedicated for company official use only and secured by a PIN.
18+
- Hot wallets: Hot wallets are not allowed for use on Polygon Labs’ multisigs.
19+
- Corporate workstation: Signing must be performed from a company system managed by our enterprise mobile device management (MDM) platform complete with anti-virus (AV) and endpoint detection and device (EDR).
20+
- Clean key: All signers are required to create a clean key that has never been exposed to a hot wallet.
21+
- Mnemonic storage: Polygon Labs mandates safe storage of mnemonic passphrases and provides guidance to its employees.
22+
- Secure communication: All multisig signing events are coordinated using Polygon Labs’ accepted communication protocols for multisigs.
23+
24+
**All corporate multisigs are monitored 24/7 by the Polygon security team.**
25+

0 commit comments

Comments
 (0)