2018-10-31 02:23:02 +01:00
|
|
|
|
Zulip’s security strategy covers all aspects of our product and
|
|
|
|
|
business. Making sure your information stays protected is our highest
|
|
|
|
|
priority.
|
|
|
|
|
|
2018-11-01 07:17:33 +01:00
|
|
|
|
## Security basics
|
2018-10-31 02:23:02 +01:00
|
|
|
|
|
|
|
|
|
- All Zulip clients (web, mobile, desktop, terminal, and integrations)
|
|
|
|
|
require TLS encryption and authentication over HTTPS for all data
|
|
|
|
|
transmission between clients and the server, both on LAN and the Internet.
|
|
|
|
|
Encryption-at-rest is available with Zulip on-premise, via hardware and
|
|
|
|
|
software disk encryption of the database and other data storage media.
|
|
|
|
|
- Zulip’s on-premise offerings can be hosted entirely behind your firewall,
|
|
|
|
|
or even on an air-gapped network (disconnected from the Internet).
|
|
|
|
|
- Every Zulip authenticated API endpoint has built in rate limiting to
|
|
|
|
|
prevent DoS attacks.
|
|
|
|
|
- Connections from the Zulip servers to Active Directory/LDAP can be secured
|
|
|
|
|
with TLS. If Zulip is
|
|
|
|
|
[deployed on multiple servers](https://zulip.readthedocs.io/en/latest/production/deployment.html),
|
|
|
|
|
all connections between parts of the Zulip infrastructure can be secured
|
|
|
|
|
with TLS or SSH.
|
|
|
|
|
- Message content can be
|
|
|
|
|
[excluded from mobile push notifications][redact-content],
|
|
|
|
|
to avoid displaying message content on locked mobile screens, and to
|
|
|
|
|
comply with strict compliance policies such as the USA’s HIPAA standards.
|
2021-09-01 01:25:05 +02:00
|
|
|
|
- Zulip operates a HackerOne disclosure program to reward hackers for
|
2018-10-31 02:23:02 +01:00
|
|
|
|
finding and responsibly reporting security vulnerabilities in Zulip. Our
|
|
|
|
|
[completely open source codebase](https://github.com/zulip/zulip) means
|
|
|
|
|
that HackerOne’s white-hat hackers can audit Zulip for potential security
|
|
|
|
|
issues with full access to the source code.
|
|
|
|
|
|
|
|
|
|
[redact-content]: https://zulip.readthedocs.io/en/latest/production/mobile-push-notifications.html#security-and-privacy
|
|
|
|
|
|
2018-11-01 07:17:33 +01:00
|
|
|
|
## Configurable access control policies
|
2018-10-31 02:23:02 +01:00
|
|
|
|
|
|
|
|
|
- Zulip supports private messages (to one or more individuals), private
|
|
|
|
|
streams with any number of subscribers, as well as public streams
|
|
|
|
|
available to all organization members. We also support guest accounts,
|
|
|
|
|
which only have access to a fixed set of streams, and announcement
|
2020-06-10 22:42:20 +02:00
|
|
|
|
streams, where only organization owners and administrators can post.
|
2018-10-31 02:23:02 +01:00
|
|
|
|
- By default, users can maintain their own names and email addresses, but
|
|
|
|
|
Zulip also supports
|
|
|
|
|
[restricting changes](/help/restrict-name-and-email-changes) and
|
|
|
|
|
synchronizing these data from another database (such as
|
|
|
|
|
[LDAP/Active Directory][ldap-name]).
|
|
|
|
|
- Zulip provides many options for
|
2019-02-27 07:14:13 +01:00
|
|
|
|
[managing who can join the organization](/help/invite-new-users),
|
2018-10-31 02:23:02 +01:00
|
|
|
|
supporting everything from open to the public (e.g. for open source
|
|
|
|
|
projects), to requiring an invitation to join, to having an email from a
|
|
|
|
|
list of domains, to being a member of a specific organization in
|
|
|
|
|
LDAP/Active Directory.
|
2019-05-10 10:28:21 +02:00
|
|
|
|
- Zulip can limit the features that new users have access to until their
|
|
|
|
|
accounts are older than a [configurable waiting period][waiting_period].
|
2018-10-31 02:23:02 +01:00
|
|
|
|
- Zulip also supports customizing whether non-admins can
|
|
|
|
|
[create streams](/help/configure-who-can-create-streams),
|
2019-05-10 10:28:21 +02:00
|
|
|
|
[invite to streams](/help/configure-who-can-invite-to-streams),
|
2021-05-17 20:13:38 +02:00
|
|
|
|
[add custom emoji](/help/configure-who-can-add-custom-emoji),
|
2018-10-31 02:23:02 +01:00
|
|
|
|
[add integrations and bots](/help/restrict-bot-creation),
|
|
|
|
|
[edit or delete messages](/help/configure-message-editing-and-deletion),
|
|
|
|
|
and more.
|
|
|
|
|
|
2019-06-10 02:46:09 +02:00
|
|
|
|
[waiting_period]: /help/restrict-permissions-of-new-members
|
2018-10-31 02:23:02 +01:00
|
|
|
|
[ldap-name]: https://zulip.readthedocs.io/en/latest/production/authentication-methods.html#ldap-including-active-directory
|
|
|
|
|
|
|
|
|
|
## Authentication
|
|
|
|
|
|
2019-10-30 00:23:07 +01:00
|
|
|
|
- Zulip supports integrated single sign-on with Google, GitHub, SAML
|
|
|
|
|
(including Okta), AzureAD, and Active Directory/LDAP. With Zulip
|
|
|
|
|
on-premise, we can support any of the 100+ authentication tools
|
|
|
|
|
supported by
|
2020-03-20 13:30:21 +01:00
|
|
|
|
[python-social-auth](https://python-social-auth.readthedocs.io/en/latest/backends/index.html#social-backends)
|
2019-10-30 00:23:07 +01:00
|
|
|
|
as well as [any SSO service that has a plugin for
|
|
|
|
|
Apache][apache-sso].
|
2018-10-31 02:23:02 +01:00
|
|
|
|
- Zulip uses the zxcvbn password strength checker by default, and supports
|
|
|
|
|
customizing users’ password strength requirements. See our documentation
|
|
|
|
|
on
|
|
|
|
|
[password strength](https://zulip.readthedocs.io/en/latest/production/security-model.html#passwords)
|
|
|
|
|
for more detail.
|
|
|
|
|
- Users can rotate their accounts’ credentials, blocking further access from
|
|
|
|
|
any compromised Zulip credentials. With Zulip on-premise, server
|
|
|
|
|
administrators can additionally revoke and reset any user’s credentials.
|
2020-06-10 22:33:48 +02:00
|
|
|
|
- Owners can deactivate any [user](/help/deactivate-or-reactivate-a-user),
|
|
|
|
|
[bot, or integration](/help/deactivate-or-reactivate-a-bot). Administrators
|
|
|
|
|
can also deactivate any [user](/help/deactivate-or-reactivate-a-user),
|
|
|
|
|
[bot, or integration](/help/deactivate-or-reactivate-a-bot) except owners.
|
2018-10-31 02:23:02 +01:00
|
|
|
|
- With Zulip on-premise,
|
2020-11-03 14:58:12 +01:00
|
|
|
|
[session length](https://github.com/zulip/zulip/search?q=SESSION_COOKIE_AGE&type=code) and
|
|
|
|
|
[idle timeouts](https://github.com/zulip/zulip/search?q=SESSION_EXPIRE_AT_BROWSER_CLOSE&type=code)
|
|
|
|
|
can be configured to match your organization’s security policies.
|
2018-10-31 02:23:02 +01:00
|
|
|
|
|
|
|
|
|
[apache-sso]: https://zulip.readthedocs.io/en/latest/production/authentication-methods.html#apache-based-sso-with-remote-user
|
|
|
|
|
|
|
|
|
|
## Integrity and auditing
|
|
|
|
|
|
2020-06-10 22:42:20 +02:00
|
|
|
|
- Zulip owners and administrators can configure users’
|
2018-10-31 02:23:02 +01:00
|
|
|
|
[ability to edit or delete messages](/help/configure-message-editing-and-deletion),
|
|
|
|
|
and whether deleted messages are retained in the database or deleted
|
|
|
|
|
permanently. Zulip by default stores the complete history of all message
|
|
|
|
|
content on the platform, including edits and deletions, and all uploaded
|
|
|
|
|
files.
|
|
|
|
|
- Zulip’s server logging has configurable log rotation policies and can be
|
|
|
|
|
used for an end-to-end history of system usage.
|
|
|
|
|
- Zulip stores in its database a permanent long-term audit log containing
|
|
|
|
|
the history of important actions (e.g. changes to passwords, email
|
|
|
|
|
addresses, and stream subscriptions).
|
|
|
|
|
- Zulip’s powerful data exports
|
|
|
|
|
([on-premise](https://zulip.readthedocs.io/en/latest/production/export-and-import.html),
|
|
|
|
|
[cloud](/help/export-your-organization)) can be imported into third-party
|
|
|
|
|
tools for legal discovery and other compliance purposes. Zulip’s
|
|
|
|
|
enterprise offerings include support for integrating these with your
|
|
|
|
|
compliance tools.
|
|
|
|
|
- Zulip supports GDPR and HIPAA compliance.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
## The little things
|
|
|
|
|
|
|
|
|
|
Many products talk about having great security and privacy practices, but
|
|
|
|
|
fall short in actually protecting their users due to buggy code or poor
|
|
|
|
|
operational practices.
|
|
|
|
|
|
|
|
|
|
Our focus on security goes beyond a feature checklist: it’s a point of
|
|
|
|
|
pride. Zulip founder Tim Abbott was previously the CTO of Ksplice, which
|
|
|
|
|
provided rebootless Linux kernel security updates for over 100,000
|
|
|
|
|
production servers (now the flagship feature of
|
|
|
|
|
[Oracle Linux](https://www.oracle.com/linux/)).
|
|
|
|
|
|
|
|
|
|
Here are some security practices we’re proud of, all of which are unusual in
|
|
|
|
|
the industry:
|
|
|
|
|
|
|
|
|
|
- The Zulip server’s automated test suite has over 98% test coverage,
|
|
|
|
|
including 100% of Zulip’s API layer (responsible for parsing user input).
|
|
|
|
|
It is difficult to find any full-stack web application with as complete a
|
|
|
|
|
set of automated tests as Zulip.
|
2020-08-18 00:18:55 +02:00
|
|
|
|
- Zulip’s Python codebase is written entirely in
|
2018-10-31 02:23:02 +01:00
|
|
|
|
[statically typed Python 3](https://blog.zulip.org/2016/10/13/static-types-in-python-oh-mypy/),
|
|
|
|
|
which automatically prevents a wide range of possible bugs.
|
|
|
|
|
- All access to user data (messages, streams, uploaded files, etc.) in the
|
|
|
|
|
Zulip backend is through carefully-audited core libraries that validate
|
|
|
|
|
that the user who is making the request has access to that data.
|
2018-11-08 01:12:48 +01:00
|
|
|
|
- Only a small handful of people have access to production servers or
|
|
|
|
|
to sensitive customer data.
|
2019-07-25 19:34:33 +02:00
|
|
|
|
- Our error handling systems have been designed from the beginning to
|
2018-10-31 02:23:02 +01:00
|
|
|
|
avoid including user message content in error reports, even in cases where
|
|
|
|
|
this makes debugging quite difficult (e.g. bugs in the message rendering
|
|
|
|
|
codebase).
|
|
|
|
|
- Zulip has a carefully designed API surface area of only about 100 API
|
|
|
|
|
endpoints. For comparison, products of similar scope typically have
|
|
|
|
|
hundreds or even thousands of endpoints. Every new API endpoint is
|
|
|
|
|
personally reviewed for security and necessity by the system architect Tim
|
|
|
|
|
Abbott.
|
|
|
|
|
|
|
|
|
|
These security practices matter! Slack, the most popular SaaS team chat
|
|
|
|
|
provider, has needed to award
|
|
|
|
|
[hundreds of bounties](https://hackerone.com/slack) for security bugs found
|
2018-12-22 16:53:47 +01:00
|
|
|
|
by security researchers outside the company.
|
2018-10-31 02:23:02 +01:00
|
|
|
|
|
|
|
|
|
## Further reading
|
|
|
|
|
|
|
|
|
|
- Detailed
|
|
|
|
|
[security model documentation](https://zulip.readthedocs.io/en/latest/production/security-model.html)
|