Our Security Commitment
At Veriglob, security is fundamental to our mission of providing trustworthy decentralized identity infrastructure. We employ industry-leading security practices, undergo regular third-party audits, and maintain a transparent approach to security that befits an open-source project handling sensitive identity operations.
Security by Design: Our protocol is architected so that compromising Veriglob's infrastructure does not compromise user identity data—because we never have access to it in the first place.
Security Architecture
Privacy-Preserving Design
Unlike traditional identity providers, Veriglob's architecture ensures:
- Zero Knowledge of User Data: Personal identity information is never transmitted to or stored on our servers.
- Cryptographic Proofs Only: We facilitate the exchange of cryptographic proofs, not underlying personal data.
- User-Controlled Keys: Private keys are generated and stored on user devices. We cannot access, recover, or reset them.
- Decentralized Trust: Verification doesn't depend on Veriglob being online—proofs can be verified independently.
Cryptographic Standards
We use battle-tested cryptographic algorithms and protocols:
| Purpose | Algorithm | Standard |
|---|
| Digital Signatures | Ed25519, ES256 | RFC 8032, RFC 7518 |
| Encryption at Rest | AES-256-GCM | NIST FIPS 197 |
| Transport Security | TLS 1.3 | RFC 8446 |
| Key Derivation | HKDF-SHA256 | RFC 5869 |
| Credential Format | JSON-LD + JWT | W3C VC Data Model |
Infrastructure Security
Cloud Infrastructure
- SOC 2 Type II Certified Providers: We host on major cloud providers with comprehensive security certifications.
- Geographic Distribution: Multi-region deployment for high availability and disaster recovery.
- Network Isolation: Virtual private clouds with strict network segmentation and firewall rules.
- DDoS Protection: Enterprise-grade DDoS mitigation at the network edge.
Access Control
- Zero Trust Architecture: All access requires authentication and authorization, regardless of network location.
- Principle of Least Privilege: Staff access is limited to the minimum necessary for their role.
- Multi-Factor Authentication: Required for all administrative access.
- Hardware Security Keys: Physical security keys required for critical infrastructure access.
- Access Logging: All access to production systems is logged and monitored.
Data Protection
- Encryption at Rest: All data is encrypted using AES-256.
- Encryption in Transit: All communications use TLS 1.3.
- Key Management: Encryption keys are managed using HSM-backed key management services.
- Secure Deletion: Data deletion follows cryptographic erasure practices.
Security Practices
Secure Development
- Security Training: All engineers complete annual security training and secure coding practices.
- Code Review: All code changes require peer review with security considerations.
- Static Analysis: Automated security scanning integrated into CI/CD pipelines.
- Dependency Scanning: Continuous monitoring for vulnerabilities in third-party dependencies.
- Signed Commits: All commits to the main repository are cryptographically signed.
Incident Response
- 24/7 Monitoring: Continuous monitoring of infrastructure and security events.
- Incident Response Team: Dedicated security team with defined escalation procedures.
- Incident Playbooks: Documented response procedures for common incident types.
- Post-Incident Reviews: All incidents trigger blameless post-mortems to prevent recurrence.
Business Continuity
- Regular Backups: Automated backups with encryption and geographic redundancy.
- Disaster Recovery: Tested disaster recovery procedures with defined RTO/RPO targets.
- Failover Testing: Regular testing of failover and recovery procedures.
Third-Party Audits
We engage independent security firms to audit our infrastructure and code regularly:
Protocol Audit
Core cryptographic protocol and SDKs
Status: Completed Q4 2024
Auditor: Trail of Bits
Infrastructure Audit
Cloud infrastructure and API security
Status: Completed Q4 2024
Auditor: NCC Group
Penetration Testing
Annual penetration testing of all public-facing services
Status: Ongoing (Annual)
Auditor: Rotating vendors
SOC 2 Type II
Organizational security controls
Status: In Progress
Expected: Q2 2025
Audit reports are available to enterprise customers under NDA. For open-source components, findings and remediations are published in our GitHub security advisories.
Vulnerability Disclosure Program
We welcome responsible disclosure of security vulnerabilities. If you believe you've found a security issue, please report it to us privately.
How to Report
What to Include
- Detailed description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any proof-of-concept code (if applicable)
- Your contact information for follow-up
Bug Bounty Program
We offer bounties for qualifying security vulnerabilities:
| Severity | Examples | Bounty Range |
|---|
| Critical | RCE, Authentication bypass, Private key exposure | $5,000 - $25,000 |
| High | Privilege escalation, Data leakage, SSRF | $1,000 - $5,000 |
| Medium | XSS, CSRF, Information disclosure | $250 - $1,000 |
| Low | Best practice violations, Minor misconfigurations | $50 - $250 |
Safe Harbor
We will not pursue legal action against researchers who follow responsible disclosure practices and act in good faith. We ask that you:
- Avoid accessing or modifying data that doesn't belong to you
- Do not disrupt services or degrade user experience
- Keep vulnerability details confidential until we've had a reasonable time to address them
- Do not use vulnerabilities for malicious purposes or personal gain
Security Best Practices for Users
While we secure our infrastructure, we recommend these practices for developers and organizations using Veriglob:
- Protect Your API Keys: Never commit API keys to version control. Use environment variables or secret management services.
- Implement Rate Limiting: Protect your integrations from abuse with appropriate rate limiting.
- Validate Inputs: Always validate and sanitize inputs when processing credentials or proofs.
- Keep SDKs Updated: Regularly update to the latest SDK versions to receive security patches.
- Monitor Usage: Set up alerts for unusual API usage patterns.
- Use Webhook Signatures: Verify webhook signatures to ensure authenticity of callbacks.
- Secure Storage: If storing credentials locally, use platform-appropriate secure storage (Keychain, Keystore, etc.).
Security Contact
For security-related inquiries, concerns, or to report vulnerabilities: