Security Standards and Practices
Our approach to security
Philosophy
Organizations are adopting cloud solutions for the flexibility and productivity they offer. However, increased efficiency can result in increased risk. At Varonis, we take our software development and security practices seriously. We refine and share our security practices so that customers can trust our solutions and approach.
Varonis secures AI and the data that powers it. The Varonis platform gives organizations automated visibility and control over their critical data wherever it lives and ensures safe and trustworthy AI from code to runtime. Varonis adopts a risk-based approach for its information security management system (ISMS). This approach requires identifying, assessing, and appropriately mitigating vulnerabilities and threats to information assets. Deploying an ISMS reduces the risk of unauthorized, accidental, or intentional information disclosure, modification, or destruction.
Our team
Our experienced teams operate in all fields of information security:
- Chief Information Security Officer (CISO) — The Varonis CISO is responsible for safeguarding the organization through the establishment of a comprehensive security program. The CISO oversees the entire security program and directs the development and review of information security policies, standards, and guidelines. Our teams follow strict security policies and procedures designed by our CISO and his highly qualified team of experts to ensure the confidentiality, integrity, and availability of information. The team’s purpose is to protect personal information from disclosure, unauthorized access, and leakage by setting up the proper classifications, controls, measurements, and incident response procedures.
- Security Operations Center (SOC) team — The point of contact for security incidents. Using a tiered structure, our global SOC teams are responsible for monitoring systems and investigating cybersecurity incidents. They also develop operational playbooks and suggest alert enhancements to improve threat detection capabilities.
- Product Security Group — Leads the secure software development life cycle (SSDLC) across all Varonis products, including cloud environments. The team conducts threat modeling and security reviews for new features, manages vulnerability remediation and scanning using various security tools, and integrates these efforts into the development process to proactively identify and address security issues. These practices are tightly integrated into the development process to maintain compliance, reduce risk, and strengthen the security posture of Varonis products.
- Governance, Risk, and Compliance (GRC) team — Responds to customers' inquiries and assessments. They are also responsible for the security awareness program, risk management, external security audits, and the compliance program.
- Corporate Security Architecture team — Defines the security requirements of our internal infrastructure, network, and cloud-based IT solutions.
- Development, Security, and Operations (DevSecOps) team — Responsible for implementing security protocols and remediating vulnerabilities.
- Security Research and Forensics team — Identifies new security issues in monitored platforms and helps define the product roadmap to ensure emerging threat coverage.
Continually improving our security program
We understand that a good security program requires ongoing effort, constant evaluation, and continual updates to improve infrastructure and cloud offerings. We regularly conduct internal and external assessments and update and improve our policies so that existing controls comply with industry leading security, privacy, and compliance standards.
How we secure our environment
Secure design
At Varonis, security is built into all systems, projects, and processes. In addition, security requirements are embedded in all stages of software development.
Quality software is built on a solid foundation, and every new software component is designed with security in mind from the ground up. We develop software using tried-and-true features and frameworks. We design characteristics by consulting our vendors about the best and safest way to implement their components while using standardized security controls.
A good software product is constantly evolving, so risk and threat management are critical to uncovering security issues and tracking them across teams for execution. Leveraging tools such as the common vulnerability scoring system enables us to assess and prioritize any issues.
We bake security into design from the beginning—every design is reviewed for security and safety hazards, and appropriate mitigations are created. The identified threats are used as a basis for further security testing.
Customer data
Varonis differentiates between data and metadata:
- Customer metadata includes user IDs and names, group names, folder and file names, email subjects, domains, and IP addresses that users access.
- Customer data includes both file and email contents.
- AI Agent prompts, which may include excerpts of the customer data.
All customer metadata is classified as “confidential” per the Varonis Global Classification Policy. Customer data is securely stored and monitored to identify immediate or potential risks within the customer’s environment.
Varonis Data Security Platform
Varonis technology crawls data sources, classifying customer data.
Customer data is then retrieved and processed by the Collector servers, which are installed inside the customer network only; neither Varonis personnel nor subcontractors have access to the collector. Varonis’ Data Security Platform does not persistently store customer data in the cloud. [1]
Metadata and data classifications are uploaded to the Data Security Platform for further customer use. The data is gathered and stored in protected storage for further analysis and to identify immediate or potential risks in the customer’s environment. This information, including alerts that are generated by the Varonis Data Security Platform, is easily viewed on the Varonis Data Security Platform dashboard. All customer metadata is always stored and transferred in encrypted form.
If a customer opts in to add AI Monitoring (e.g., Copilot, AgentForce, or ChatGPT Enterprise) as a data source, Varonis will collect, analyze, and store AI prompts (questions) and responses from AI audit logs in the Data Security Platform (SaaS). Customers can then retrieve them via Varonis’ analytical interface. During this process, Varonis (SaaS) is not exposed to full documents, only to prompts in AI audit logs. The prompts are stored for the licensed retention period (180 days). See “How we keep your data secure” below, which applies for prompts as well. Customer users must be authorized to access Copilot prompts by assigning an AI Prompt auditor role. In addition, AI prompts are secured inside the platform using tenant segregation, and access to Varonis personnel is restricted to a dedicated support team with least-privilege access and on a need-to-know basis.
Varonis DatAdvantage Cloud
Varonis DatAdvantage Cloud works exclusively with cloud data sources, such as Salesforce, Google Suite, Box, etc.
For these data sources, Varonis does not require the installation of a Collector server. All necessary data is retrieved by DatAdvantage Cloud from the data sources for classification.
The data is not stored in the cloud, and after data classification (which takes a matter of seconds per file), the data is discarded. Only metadata and classification results are stored in the cloud to enable their analysis by customers.
Access control and management
Securing production access
Varonis has defined processes for provisioning user access. New hires are granted access to resources based on their role in the company, that is, Varonis uses role-based access control (RBAC) and the least privilege principle. Only essential employees can request access to the production environment. All access requires business owner approval and documented business justification. Access is also audited, has time limitations, and is constantly monitored by the SOC teams. Multifactor authentication (MFA) is also mandatory for each session.
Figure 1: Access authorization
Figure 1: Access authorization
Access reviews
All production accounts are reviewed and approved periodically by the business owners to ensure the accounts have the appropriate level of access and permissions. Varonis personnel use strong authentication with MFA to access the production environment.
Passwords
Varonis’ cloud services have a defined password policy that follows industry best practices and vendor recommendations. Our access authorization process covers provisioning, reviews, and password strength.
User authentication and federation
Authentication is performed using OAuth 2.0. Either Varonis’ IDP (Okta) can be used, or customers can configure federation using SAML 2.0 with their IDPs. The latter enables customers to control login policies such as MFA, password complexity, lockout policy, source IP addresses, and more.
Figure 2: Federated authentication workflow
Figure 2: Federated authentication workflow
Secured architecture and data flow
Backend processes access customers’ cloud services and on-premises data stores (such as NetApp file servers) and collect events and metadata for objects such as files, folders, users, groups, etc. All gathered information is stored with per-tenant partitioning, enforcing no cross-tenant access. The information is then shown in the web UI only to authenticated users, who can only access the specific tenant they are logged in to. All data is encrypted in transit, both externally and internally.
Figure 3: Varonis' Data Security Platform architecture
Figure 3: Varonis' Data Security Platform architecture
Figure 4: DatAdvantage Cloud architecture
Figure 4: DatAdvantage Cloud architecture
API permissions
Varonis supports the assignment of users to roles and implements RBAC so that each API call verifies that the user who accesses the backend API via the UI is assigned a required role.
- RBAC — Varonis supports RBAC, allowing customers to assign different roles to IT engineers, SOC, compliance officers and segmentation by a department. This allows customers to implement least privilege for the users that access the system.
- API Access — Varonis platforms expose a web API, allowing customers to integrate third-party systems, including security information and event management (SIEM), security orchestration, automation, and response (SOAR), data warehouses, and more to extract Varonis collected data, automate deployment, and build custom dashboards. API access is conducted via API keys and protected using a web application firewall (WAF).
Building security into our network architecture
Varonis personnel must be identified and authenticated according to the assigned user role before they can use any resources. A native security system and add-on software products provide resource protection; these systems and software products identify and authenticate users and validate access requests by comparing the user’s authorized roles in access control lists. Monitoring is performed by uninvolved personnel, such as a supervisor not involved in the work activities or by an employee from another department.
Varonis has defined configuration standards. A security architect defines these standards, which are updated annually and on an as-needed basis. Prior to implementation, configuration standards are reviewed and approved by the lead security architect and lead system architect.
Varonis resources are managed in the asset inventory system, and each asset is assigned an owner. Owners are responsible for approving access to the resource and for performing periodic reviews of access.
Network security
Varonis secures our external and internal networks with various technologies and monitoring tools as well as our secured network architecture:
- Internal segmentation is performed for different services.
- High availability and load balancing arrays are in place for production systems to help mitigate the effects of system errors.
- A web application firewall (WAF) is in front of our cloud-based solutions and corporate infrastructure, with enforced rules to block malicious web attacks, denial-of-service (DoS), and distributed denial-of-service (DDos) attacks and prevent access from sanctioned countries.
- The Microsoft Azure and Amazon AWS public cloud infrastructure provide overall network protection against distributed denial-of-service (DDoS) attacks. Network security attacks and alerts are monitored continuously by the security operations center.
- Network access from servers in the cloud is restricted to prevent data exfiltration.
Securing our endpoint devices
Endpoint security is a pivotal mechanism of Varonis’ in-depth security defense approach. We use the following techniques to minimize threats to our endpoints:
- Protection from malware — Within our corporate infrastructure, the Varonis security team has deployed antimalware and endpoint detection, in addition to response solutions on our internal servers that are monitored by the SOC team.
- Patch management — Our patch management policy requires security updates be installed promptly. All devices are continuously scanned for vulnerabilities.
- Configuration management — We have developed a hardening policy for our corporate servers.
- Mobile device management — We have a mobile device management (MDM) solution for all our corporate and authenticated devices, including encryption, password protection, session timeout, auditing, and the prevention of access to production data via smartphones or internet of things (IoT) devices.
- Monitoring — Our SOC team continuously monitors our assets and responds to any anomalous, suspicious, or malicious activity from servers and endpoint devices. The SOC team receives alerts from various security systems. The team is constantly improving threat detection capabilities and partners with our service providers to fine-tune our rules and proactively hunt for new detection and response methods.
Our operational security
Managing configurations and changes
Changes within all our environments are subject to structured change-management procedures. They undergo design and impact analysis and are continuously monitored. As with all our processes, the procedure is subject to annual external audits (SOC 2 and ISO/IEC 27000 series).
Software code changes
Our continuous integration/continuous deployment (CI/CD) processes are fully integrated into our production changes. These processes include a peer programmer code review (by someone who is not responsible for the change) and approval of each change committed. Newly developed code then undergoes several stages of quality assurance processes, such as regression, unit, security, and integration testing. The candidate builds then undergo manual and automatic tests, which are based on documented test plans. When tests are completed, the new candidate build is reviewed and approved by the relevant manager. We apply the same process for multitenant applications. All changes are logged and documented in a version control system.
Infrastructure and other changes
We established a documented process for all other types of changes, including impact analysis, security team and business owner approval, documentation, tests, a fallback plan, and customer notification when necessary.
Communication of changes
Varonis provides customers notifications and information regarding upgrades and changes to the cloud service that could adversely affect their cloud environment. All software update packages are distributed as part of upgrades and contain a digital signature.
Logging and monitoring
Varonis’ comprehensive logging and monitoring of its IT infrastructure and cloud-based security solution detects and reacts to inappropriate access of and/or use of information systems or data. We collect detailed audit logs from all cloud offerings and corporate infrastructure environments. Our security operations center and cloud operations teams monitor logs and use automated notifications and playbooks for performance issues or security incidents.
Log access is strictly read-only to prevent tampering or deletion. All log access is provisioned according to the principle of least privilege. Access is restricted to a minimal number of employees and requires management approval.
Business continuity and disaster recovery management
Customer support and resilience are Varonis’ top priorities. Our business continuity (BC) plan outlines measures to avoid disruptions to our customers and partners. The continuity plan includes impact analysis and risk assessment to help identify critical functions and processes. We also have BC/DR plans for the following:
- Corporate infrastructure
- Working remotely
- Cyber incident response
- Pandemic preparedness
Our cloud environments are monitored by the cloud operations and incident response teams. We have an established process to notify customers of any downtime.
Backup and restore
Varonis has documented policies in place to guide personnel in system backup and recovery activities. We ensure the availability and integrity of customer data by conducting regular daily backups and periodic restoration tests. Customer data is saved at the Amazon AWS and Microsoft Azure data centers and replicated to a distant availability zone by default. We use infrastructure-as-a-code to build our data servers automatically. This also allows rebuilding of the infrastructure quickly in the event of disaster.
High availability architecture
To ensure high availability, certain critical cloud production infrastructure components and services are fully redundant, to avoid single points of failure and downtime.
Cloud hosting resiliency features
Microsoft Azure and Amazon AWS services provide resilient cloud hosting services by default via availability zones, with redundant data centers, power supply, internet links, and more. Physical and logical controls are in place to ensure that customer data is highly available and can be recovered in the event of data loss or corruption. Our cloud providers perform ongoing tests of the resiliency of data centers to continuously improve the overall security architecture and validate that they meet the highest security standards.
Monitoring
The cloud infrastructure is continuously monitored by our engineers and is securely designed to detect and immediately respond to any failure. Customer logs are stored in the same data centers as data itself to provide a quick resolution and avoid downtime to the extent possible. We also established a process to notify customers in the event of downtime. Availability controls are annually tested during the SOC 2 and ISO27000 audits.
Customers can use https://varonisprod.statuspage.io/ to subscribe to proactive communications about outages.
Physical security
Varonis maintains a physical security policy that aligns with industry best practices. The policy details procedures for securing offices globally, restricting access to buildings and offices, monitoring badge access, conducting periodic entry reviews, and monitoring workplaces continuously.
Our SOC 2-compliant partner data centers address various physical security and environmental controls. We review the compliance certificates and attestation reports annually to ensure a consistent level of protection.
Third-party data center access
We use Amazon AWS and Microsoft Azure as service providers for our cloud-based solutions. Both organizations have sufficient physical access control systems and security staff using surveillance, detection systems, and other electronic means to secure their data centers.
Physical security of Varonis’ facilities
Physical access protection mechanisms include entrances controlled by access cards and surveillance cameras, as well as other environmental security controls. Employees must have ID badges on their persons when on Varonis premises, and badges are not to be shared with anyone else. Access rights are granted according to the least privilege model and are promptly revoked for terminated and transferred personnel, or for personnel no longer requiring access to the facility at which the information system is located. Access rights are reviewed and approved periodically by the facility manager. Varonis facilities are monitored and secured using surveillance cameras and locks, identification cards, and physical presence (guards and company personnel).
How we keep your data secure
Encryption
Customer data in transit over public networks is encrypted using — at a minimum — transport layer security (TLS) 1.2 or later. Varonis uses strong ciphers with longer keys and Federal Information Processing Standards (FIPS)–compliant ciphers where possible. We also regularly monitor used ciphers and algorithms to ensure deprecated versions are not used.
Authorized employees can access Varonis cloud solutions using virtual private networks (VPN) and MFA. Varonis implemented secure data transmission protocols to encrypt data when transmitting over public networks. Encryption is also enabled on databases at rest and on data backups. Communication between the boundaries is encrypted. External zone boundaries (internet-facing services) are exposed through TLS.
Data encryption at rest is enforced on all tenants and servers by our cloud service providers by default. Data is encrypted at rest using advanced encryption standard (AES) 256-bit encryption.
Cryptography
Varonis utilizes the following ciphers.
Asymmetric ciphers - RSA 3072-bit or stronger, Elliptic Curve NISP P-256 or stronger.
Symmetric ciphers - AES 256-bit or above, in AES-GCM mode or equivalent.
Key management
Varonis uses Azure Key Vault and AWS Key Management Service and Secrets Manager for keys, secrets, and credential management. Access restrictions are applied to secret stores, and no access is provided to users. All attempts to access parts of the infrastructure, including the Key Vaults, require permissions that are unavailable to users. Any attempts to access the infrastructure are audited.
Data centers
We selected Amazon AWS and Microsoft Azure, both of which are leaders in Gartner’s Magic Quadrant for Cloud Infrastructure and Platform Services. Varonis’ Data Security Platform and DatAdvantage Cloud components are hosted in multiple availability zones. Our data centers are certified by various security industry standards.
Multi-tenancy security
Logical security is implemented to create tenant separation and avoid compromising the data or tenants of other customers .
- Separate roles, secrets, and database partitions exist for each customer.
- All secrets, such as tokens for connecting to customer databases, are stored in managed Key Vault solutions. Separate roles are used to access each tenant’s secrets.
- Employee access to production is restricted and only allowed on demand for certain employees for a short period of time and only with manager approval.
- The production environment is completely separated from the staging and development environment, with separate access control and a segmented network.
- In addition to logical separation, for software that processes customer metadata, we provide per-customer software for flows that process full customer data.
Sharing the responsibility for managing customer data
The Varonis Data Security Platform is designed to have shared responsibilities that are managed by users. Customer controls are expected to be in operation at user organizations to complement Varonis controls.
Customers are responsible for:
- Ensuring a strong password policy
- Connecting their identify provider to enforce:
- Single sign-on
- Authentication
- MFA
- Password policy
- Configuring federation of the customer’s IdP
- Ensuring timely deactivation of user accounts for employees when user access is no longer required
- Securing on-premises components
- Ensuring a patch management process
- Ensuring restricted access to the on-premises components
- Encrypting disks
- Implementing an anti-malware/EDR solution with frequent signature updates and monitoring of alerts
- Continuous monitoring of the relevant system components
- Configuring application roles for employees based on the least-privilege access
- Securing initial tenant accounts with a strong password policy
- Ensuring secure integration with monitored platforms
- Using strong secrets for data source access
- Periodically rotating secrets
- Using only encrypted connectivity for data source access
- Selecting tenant geolocation
Data retention
Customer data is deleted either at the request of the customer or automatically based on life cycle policies that are communicated to the customer. Customer data retention is explained in the Varonis Privacy Policy (under the section “How long do we retain the information we collect?”).
HR security practices
In addition to technical means, information security requires human enforcement and application. Our human resource (HR) security practices address the controls that mitigate employee security risks. Our employment life cycle policy includes all HR security topics and applies to all employees, staff role changes, and local subcontractors.
Hiring
- Where applicable by law and per Varonis policy, background verification checks are performed on all candidates for employment in the US, UK, Ireland, and India.
- Employees are required to sign a nondisclosure agreement (NDA) and review security policies and our code of conduct.
- Users are assigned only relevant roles and permissions.
During employment
- All employees undergo security and privacy training annually. The program includes instruction by our CISO on the current industry threat landscape and periodic phishing simulations.
- Developers perform periodic role-based security training.
- Access permissions are periodically reviewed and modified if an employee’s role changes.
Account termination
- Varonis has procedures to revoke all logical and physical access and requires the return of all Varonis-supplied computing devices following employee termination.
- The HR department initiates the termination process, which triggers the immediate actions required from the relevant departments.
Security awareness training
All employees receive appropriate security and privacy awareness training, along with regular updates to organizational policies and procedures, as relevant for their role.
Security training for employees is the responsibility of the security team. It is an ongoing program by which all employees are continually trained in the security issues relevant to their functions and positions in the company.
The training is relevant to each employee at the employees’ functional level and comprises:
- General security training for all employees
- Privacy training for employees with access to personally identifiable information (PII)
- Secure code training for developers
Other requirements:
- Employee guidelines are distributed and uploaded to the intranet portal
- Updates or newsletters are sent to employees as decided by the CISO.
- New employees must read and sign the education package
- Annual review and confirmation of relevant security policies for each employee is required.
How we secure our solution
Secure design through SSDLC framework
Varonis adopted the Secure Software Development Life Cycle (SSDLC) framework as part of its holistic development approach. This proven approach focuses on adding security to the standard SDLC policy and incorporating security as a major component of every phase of the SDLC. Using this methodology empowers Varonis to build secure applications and IT systems quickly, reduce rework costs, and proactively identify and address potential security issues, making this method a viable investment for organizations.
Illustrated in Figure 5 below, the approach has the following six phases:
- Planning and requirements — This is a fundamental and critical phase of the process, during which the organization’s needs for the intended product or service are identified with substantial feedback and interaction from/with customers. At this stage, pertinent information about the purpose of the product or service and expectations is collected and used to determine its feasibility. At the end of this stage, all ambiguities are resolved, and features of the intended solution are formally documented.
- Design — Gather requirements (business, functional, and mandatory security) to incorporate into design. Define what should happen, in terms of functional requirements, and what should not, in terms of security requirements.
- Development — Determine the best approach to meet stakeholder needs by identifying alternatives and making the decision to purchase or custom build the system or service per specified requirements. Use established secure coding guidelines as well as code reviews that double-check that guidelines have been followed correctly for both codes written from scratch and when leveraging existing code from open sources.
- Testing — Conduct pre-release testing against the original design and security requirements. The application is not ready to be deployed unless test results are satisfactory and the customer provides formal acceptance.
- Release — Go-live, operate, maintain, and modify. Plan for modifications to application functionality based on feedback in the form of future releases, upgrades/updates, and system enhancements.
- Maintenance — During the maintenance phase, Varonis provides updates to the software to fix security vulnerabilities. After the maintenance phase is over, Varonis does not usually stop providing security unless there is an exceptional situation at hand.
Figure 5: Varonis SSDLC model
Figure 5: Varonis SSDLC model
Code analysis
Varonis uses both manual and automated secure code review techniques to examine its application’s source code. The goal of this examination is to identify security flaws or vulnerabilities. During our code review, developers specifically look for logic errors, examine implementation, and check style guidelines, among other tasks. During the automated code review, Varonis uses commercial tools to automatically review the source code of the application, using a predefined set of rules to look for inferior code.
How we identify, protect, and respond to threats
Security testing
At Varonis, we rigorously and continuously evaluate our security posture by testing our products, services, and infrastructure security controls and processes. We scan for vulnerabilities and misconfigurations and remediate issues promptly.
Customer reports and tickets — We welcome notifications and respond promptly when a vulnerability is identified by one of our customers.
A summary of our security testing methods is as follows:
- External Penetration testing — We conduct external penetration testing using penetration testing teams to perform thorough assessments of our applications and infrastructure. These tests simulate real-world attack scenarios to identify and remediate vulnerabilities.
- Internal Penetration testing — Our product security team conducts regular penetration tests on critical systems and functionalities to validate resilience against evolving threats.
- Web security — Web application and service vulnerabilities are addressed through both external and internal penetration tests, complemented by specialized scanning tools.
- SAST and Code Review — Code commit undergoes automated Static Application Security Testing (SAST) integrated into CI/CD pipelines. In addition, manual and automated code reviews are performed by development and security teams to ensure secure coding practices.
- Network scans — We perform comprehensive network scans using industry-leading tools to identify active services, open ports, and potential vulnerabilities across all assets.
- External asset discovery — We continually evaluate and integrate advanced scanning tools to identify and monitor external-facing assets, improving our vulnerability detection capabilities.
Bug bounty program
Varonis partners with HackerOne to maintain our public and private bug bounty programs. Our programs encourage HackerOne’s massive network of security researchers to evaluate our assets and report any discovered vulnerabilities to our team for remediation. We foster relationships with the community to proactively identify new threats and improve security for our customers, partners, suppliers, employees, and overall company. More information about our public bug bounty program can be found here.
- Vulnerability remediation policy — We have a documented policy that defines time frames for fixing security vulnerabilities based on severity levels, ensuring compliance with industry standards.
Incident response
Varonis has a structured, consistent framework for the central coordination and monitoring of and response to all security-related events and incidents. Our security operations center continuously supervises events from all environments, correlates and merges logs, and creates automated and documented playbooks for various incident types. The threat intelligence team actively collects information from external resources. Our incident response plan includes step-by-step instructions for handling suspicious events and aggregation of events, including:
- Detection and analysis
- Categorization
- Containment
- Eradication
- Recovery
- Lessons learned
We test our response plans periodically with a red team and a blue team. As highly qualified and experienced security professionals and forensic experts, our Incidence Response (IR) team is trained to detect and respond quickly to any security incident.
Our IR plan includes notification workflows. If a customer’s data or tenant is involved in an incident, the stakeholders are notified promptly. Once the investigation is complete, an after-action meeting is held to discuss process improvements and avoid future incidents.
Our risk management and compliance programs
Risk management programs
Varonis has a risk management policy and practice that includes risk identification, analysis, communication and reporting, treatment, and monitoring. Each risk is evaluated by the level of potential impact, and the treatment plan is an ongoing effort by all relevant Varonis departments.
Enterprise risk management program
Companywide risks are covered during the annual enterprise risk assessment, performed by the internal auditor, and presented to senior management and the audit committee of the board of directors. The CISO conveys cyber threats, following which a mitigation plan is created and implemented.
Cyber risk assessment
We conduct regular technical risk assessments for software development, cloud production, and corporate and cloud infrastructure. The security department monitors the progress of such efforts until all substantial risks are remediated.
Third-party risk management
As with all other processes, engagements with third-party suppliers undergo a security risk assessment. Varonis ensures that vendors, who are thoroughly vetted for security and posture, are capable of delivery and aware of inherent security risks. We assure our customers that their data is protected by thoroughly reviewing third parties’ security, compliance, and privacy practices. Whenever data is shared with a new third party, our customers are notified, and the vendor list is updated. High-risk third parties that hold customer data undergo periodic review. Each engagement with potential disclosure of PII requires a privacy assessment and signing of a mutual data processing addendum. We also require an NDA and security agreements.
Compliance with laws, regulations, and standards
The security standards that Varonis maintains are scoped for all our cloud solutions. Our compliance program constantly evolves to keep cloud infrastructure, policies, and standards updated with industry best practices. This compliance also includes regular independent external audits to ensure security, privacy, and compliance controls and procedures.
Varonis has nearly 30 security policies in place that cover various security domains in our documentation. We align our policies with various ISO/IEC standards (27001, 27017, 27018, and 27701), NIST 800-53, American Institute of Certified Public Accountants (AICPA), and other privacy regulations.
Regulatory compliance certifications
Varonis is certified for various industry standards and certifications, which are maintained in our Trust Center.
Our policy program requires an annual review, a process for improvements, and CISO and senior management evaluation. Employees are required to read the policies at regular intervals. Varonis policies are available for review on the company portal.
Privacy policies and practices at Varonis
We take privacy seriously. Varonis is committed to data protection laws and regulations and maintains appropriate procedures in our product information management systems (PIMS). Our privacy program aligns with global privacy standards, including the General Data Protection Regulation (GDPR).
We recognize the need for appropriate protection and management of personal information that you provide to us. Our main policies and practices are detailed below:
- Privacy Standards and Practices
- Varonis Privacy Policy
- Data Processing Addendum for our Data Security Platform Customers
Our main data privacy principles are:
- Data retention and minimization — We only collect essential information and retain it for the shortest period necessary.
- Purpose limitation — We limit the processing of data to that which is adequate, relevant, and necessary for the identified purpose.
- Data processing addendum — All relevant third-party processors must comply with Varonis’ policies and terms.
- Data subject rights — We have a process in place to handle all relevant data subject requests promptly.
- Breach notification — Our incident response policy includes a privacy breach workflow requiring all relevant stakeholders to be notified promptly.
- Training — All employees are trained in our privacy policies and procedures to increase awareness and comply with GDPR and other privacy regulations.
- Privacy assessment — All third parties with access to PII undergo a privacy assessment.
Data residency
During the onboarding process, customers can select the geolocation of their tenant. The data center hosting locations for our cloud offerings are listed within our Sub-Processors List.
Please note that some data is processed by third parties. The specific types of data, the locations where this processing occurs, and the identities of these providers are all detailed in Varonis’ Data Processing Addendum (DPA).
Internal and external audit
Varonis is committed to and conducts its business activities lawfully and in a manner that is consistent with its compliance obligations. This includes legislative obligations, regulations, security standards, intellectual property rights, protection of records, independent review of information security, compliance with security policies and standards, contractual requirements, applicable privacy regulations, industry standards, and Varonis internal policies, standards, and procedures.
Varonis verifies compliance to standards through various methods, including but not limited to periodic security assessments, business tool reports, and internal and external audits.
We perform comprehensive security audits through well-known audit firms at least annually. Additional internal audits are performed in areas that are deemed “high risk” and are reported to the audit committee of the Varonis board of directors. Audit outputs are all fed into a continuous improvement cycle which helps us continually sharpen the overall security program.
Law enforcement and government requests for data
Varonis has a defined process that incorporates our legal department to ensure that while we comply with law enforcement and the government’s requests for data, we also strive, as legally permissible, to maintain our customers’ confidentiality in compliance with the law and to notify our customers of any government requests related to their data.
Your privacy matters to us
We are committed to protecting your data privacy and rights. We are also committed to responsible stewardship of the data under our control and ensure compliance with all applicable data protection laws that regulate the collection, use, and disclosure of data and privacy.
[1] Customers could enable the optional “File Analysis” role in the cloud, which allows customer users with an approved File Analysis role to retrieve specific files via the Data Security Platform without storing them.
FAQs
Customer data is then retrieved and processed by the Collector servers installed inside the customer network only; Varonis personnel or subcontractors cannot access it. Varonis' Data Security Platform does not persistently store customer data in the cloud.
Metadata and data classifications are uploaded into the Data Security Platform for further customer use. The data is gathered and stored in protected storage for further analysis and to identify immediate or potential risks in the customer’s environment. This information, including any alerts produced, is easily viewed on the Varonis Data Security Platform dashboard. All customer metadata is always stored and transferred in encrypted form.
Varonis DatAdvantage Cloud works exclusively for cloud data sources, such as Salesforce, Google Suite, Box, etc.
For these data sources, Varonis does not require installing a Collector server, and the full data is retrieved by DatAdvantage Cloud from the data sources for classification.
The data is not stored in the cloud, and after data classification (which takes a matter of seconds per file), the data is discarded. Only metadata and classification results are stored in the cloud to enable their analysis by the customers.
Varonis uses the secure software development life cycle framework within our holistic development approach to ensure that security is incorporated into every part of our development process.
Yes, customer data in transit is encrypted using — at a minimum — transport layer security (TLS) 1.2 or later. Varonis uses strong ciphers with longer keys and FIPS-compliant ciphers where possible. We also regularly monitor used ciphers and algorithms to ensure deprecated versions are not used.
Yes, our cloud service providers enforce data encryption at rest by default on all tenants. Data is encrypted at rest using the advanced encryption standard 256-bit encryption.
We use key vault solutions for secret and credential management. Access restrictions are applied to vaults, and users are not allowed access. All attempts to access parts of the infrastructure, including the key vaults, require permissions unavailable to the system user.
Any attempts to access the infrastructure are audited.
Multi-tenancy. We have controls in place to ensure that logical security is implemented to keep customer tenant data separate and avoid compromising the data of other tenants.
Yes, all employees are assigned security training upon hire and annually. In addition, employees undergo periodic phishing simulations.
We use both manual and automated secure code review techniques to examine an application’s source code. The goal of this examination is to identify any existing security flaws or vulnerabilities. During our code review, developers specifically look for logic errors, examine implementation, and check style guidelines, among other tasks. During the automated code review, Varonis uses commercial tools to automatically review the application's source code, using a predefined set of rules to look for inferior code.
Have questions? Contact us.
Have questions? Contact us.
Report a vulnerability
https://hackerone.com/varonis
Report security issue
soc@varonis.com