Security

Last Updated: January 3, 2025

Our Security Commitment

At Veriglob, security is fundamental to our mission of providing trustworthy decentralized identity infrastructure. We employ industry-leading security practices, undergo regular third-party audits, and maintain a transparent approach to security that befits an open-source project handling sensitive identity operations.

Security by Design: Our protocol is architected so that compromising Veriglob's infrastructure does not compromise user identity data—because we never have access to it in the first place.

Security Architecture

Privacy-Preserving Design

Unlike traditional identity providers, Veriglob's architecture ensures:

  • Zero Knowledge of User Data: Personal identity information is never transmitted to or stored on our servers.
  • Cryptographic Proofs Only: We facilitate the exchange of cryptographic proofs, not underlying personal data.
  • User-Controlled Keys: Private keys are generated and stored on user devices. We cannot access, recover, or reset them.
  • Decentralized Trust: Verification doesn't depend on Veriglob being online—proofs can be verified independently.

Cryptographic Standards

We use battle-tested cryptographic algorithms and protocols:

PurposeAlgorithmStandard
Digital SignaturesEd25519, ES256RFC 8032, RFC 7518
Encryption at RestAES-256-GCMNIST FIPS 197
Transport SecurityTLS 1.3RFC 8446
Key DerivationHKDF-SHA256RFC 5869
Credential FormatJSON-LD + JWTW3C VC Data Model

Infrastructure Security

Cloud Infrastructure

  • SOC 2 Type II Certified Providers: We host on major cloud providers with comprehensive security certifications.
  • Geographic Distribution: Multi-region deployment for high availability and disaster recovery.
  • Network Isolation: Virtual private clouds with strict network segmentation and firewall rules.
  • DDoS Protection: Enterprise-grade DDoS mitigation at the network edge.

Access Control

  • Zero Trust Architecture: All access requires authentication and authorization, regardless of network location.
  • Principle of Least Privilege: Staff access is limited to the minimum necessary for their role.
  • Multi-Factor Authentication: Required for all administrative access.
  • Hardware Security Keys: Physical security keys required for critical infrastructure access.
  • Access Logging: All access to production systems is logged and monitored.

Data Protection

  • Encryption at Rest: All data is encrypted using AES-256.
  • Encryption in Transit: All communications use TLS 1.3.
  • Key Management: Encryption keys are managed using HSM-backed key management services.
  • Secure Deletion: Data deletion follows cryptographic erasure practices.

Security Practices

Secure Development

  • Security Training: All engineers complete annual security training and secure coding practices.
  • Code Review: All code changes require peer review with security considerations.
  • Static Analysis: Automated security scanning integrated into CI/CD pipelines.
  • Dependency Scanning: Continuous monitoring for vulnerabilities in third-party dependencies.
  • Signed Commits: All commits to the main repository are cryptographically signed.

Incident Response

  • 24/7 Monitoring: Continuous monitoring of infrastructure and security events.
  • Incident Response Team: Dedicated security team with defined escalation procedures.
  • Incident Playbooks: Documented response procedures for common incident types.
  • Post-Incident Reviews: All incidents trigger blameless post-mortems to prevent recurrence.

Business Continuity

  • Regular Backups: Automated backups with encryption and geographic redundancy.
  • Disaster Recovery: Tested disaster recovery procedures with defined RTO/RPO targets.
  • Failover Testing: Regular testing of failover and recovery procedures.

Third-Party Audits

We engage independent security firms to audit our infrastructure and code regularly:

Protocol Audit

Core cryptographic protocol and SDKs

Status: Completed Q4 2024

Auditor: Trail of Bits

Infrastructure Audit

Cloud infrastructure and API security

Status: Completed Q4 2024

Auditor: NCC Group

Penetration Testing

Annual penetration testing of all public-facing services

Status: Ongoing (Annual)

Auditor: Rotating vendors

SOC 2 Type II

Organizational security controls

Status: In Progress

Expected: Q2 2025

Audit reports are available to enterprise customers under NDA. For open-source components, findings and remediations are published in our GitHub security advisories.

Vulnerability Disclosure Program

We welcome responsible disclosure of security vulnerabilities. If you believe you've found a security issue, please report it to us privately.

How to Report

Email: security@veriglob.com

PGP Key: Available at /.well-known/security.txt

GitHub Security Advisories: For open-source components, use GitHub's private vulnerability reporting

What to Include

  • Detailed description of the vulnerability
  • Steps to reproduce the issue
  • Potential impact assessment
  • Any proof-of-concept code (if applicable)
  • Your contact information for follow-up

Bug Bounty Program

We offer bounties for qualifying security vulnerabilities:

SeverityExamplesBounty Range
CriticalRCE, Authentication bypass, Private key exposure$5,000 - $25,000
HighPrivilege escalation, Data leakage, SSRF$1,000 - $5,000
MediumXSS, CSRF, Information disclosure$250 - $1,000
LowBest practice violations, Minor misconfigurations$50 - $250

Safe Harbor

We will not pursue legal action against researchers who follow responsible disclosure practices and act in good faith. We ask that you:

  • Avoid accessing or modifying data that doesn't belong to you
  • Do not disrupt services or degrade user experience
  • Keep vulnerability details confidential until we've had a reasonable time to address them
  • Do not use vulnerabilities for malicious purposes or personal gain

Security Best Practices for Users

While we secure our infrastructure, we recommend these practices for developers and organizations using Veriglob:

  • Protect Your API Keys: Never commit API keys to version control. Use environment variables or secret management services.
  • Implement Rate Limiting: Protect your integrations from abuse with appropriate rate limiting.
  • Validate Inputs: Always validate and sanitize inputs when processing credentials or proofs.
  • Keep SDKs Updated: Regularly update to the latest SDK versions to receive security patches.
  • Monitor Usage: Set up alerts for unusual API usage patterns.
  • Use Webhook Signatures: Verify webhook signatures to ensure authenticity of callbacks.
  • Secure Storage: If storing credentials locally, use platform-appropriate secure storage (Keychain, Keystore, etc.).

Security Contact

For security-related inquiries, concerns, or to report vulnerabilities:

Security Team Email: security@veriglob.com

Response Time: We acknowledge reports within 24 hours

PGP Key Fingerprint: 4A8F 9E2B 1C3D 5E6F 7A8B 9C0D 1E2F 3A4B 5C6D 7E8F

security.txt: https://veriglob.com/.well-known/security.txt