VictoriaMetrics' Approach to Database Security
Security at VictoriaMetrics Inc.
We apply the following security measures:
VictoriaMetrics Security Program
Defines how we keep our company’s and customers’ data secure, assesses risk & addresses these risks.
Defines security protocols for all Victoria Metrics operations, services, and systems.
Information Security Team
Its main responsibility is to set up security processes, ensure their effectiveness, and handle security risks and incidents.
Reach us at:
security@victoriametrics.com
Security & Privacy Training
We conduct Security & Privacy training for every new team member upon onboarding, and do annual reviews.
The Information Security Team is responsible for implementing the Security and Privacy Training.
VictoriaMetrics Security Certifications
EAA:
SIC - System of International Certification Certificate for
Information Security Management System Certificate
AMERICAS:
IAS - Certificate of Registration
Information Security Management System
These comply with the requirements of the international standard
ISO / IEC 27001:2013 for Information Security Management Systems.
Mandatory Security Policies
We have a number of mandatory security policies:
Everyone on our staff must be familiar with and follow recommendations made by NIST and OWASP.
In addition, everyone must follow the policies defined in the following VictoriaMetrics Information Security Program.
Finally, we follow a set of defined policies and procedures that deal with the following security-related topics:
& Incident Response
Services
Key Security Features in VictoriaMetrics
If you’d like to know more about the security features in VictoriaMetrics, please visit our VictoriaMetrics Enterprise page or
Security for Open Source Projects - Some Recommendations
- Every code change is peer-reviewed and approved
- Verification of change for known and valid GPG signature
- Dependency bloat control and automatic vendor scanning for vulnerabilities
- Release artifacts scanning before every publication for known vulnerabilities
- Release post publish artifacts scanning for new vulnerabilities
- Internal security audits