As we understand how important security and compliance are, we’ve worked hard to make sure that Zeplin is secure. The security and protection of our customers’ data is definitely a top priority and this paper outlines our approach to security and compliance and details the technical controls that keep your data safe.

What is Zeplin?

Zeplin is a collaboration and hand-off tool, built for graphic designers and developers. An app on your Mac or PC provides plugins to popular design tools like Sketch. When designers export their work into a Zeplin project, we turn the images and design data into specs and style guides. Both from the native app or our Web app, developers access these specs and generate platform-related code snippets.

Zeplin can integrate with your communication tools, such as updating a Trello board or sending a message to Slack whenever a change is made to the Project. All data is securely hosted on our back-end. Each connection made to Zeplin is end-to-end encrypted over HTTPS. Only you and the people you invite to your Project have access to this data. We have very restricted access control policies for the live data, and applying industrial standards for data at rest.

People

Security isn't just about making sure the right technology is in place. Zeplin makes sure we have the right people who build, maintain and oversee the systems. Although we are a small team, we are rigorous in making sure we hire the right people.

Every employee is subject to a background check. Once hired, all employees must learn Zeplin's security policies and go through a comprehensive security awareness training session. Key topics such as customer data privacy, data security, and phishing awareness are covered. New employees must agree to our Code of Conduct, which highlights our commitment to keeping information safe and secure. Ongoing training ensures that our crew is aware of new threats as they emerge.

An information security officer is responsible for ensuring all employees follow policies and procedures, as well as making sure those policies and procedures are relevant and up to date.

Privacy and Trust

Zeplin has procedures in place that limit access to sensitive information and system access only to necessary staff. All staff members have individual credentials, and multi-factor authentication is mandatory for staff when accessing sensitive systems.

Zeplin requires our tools and service providers are as secure as our own systems. We insist any suppliers we use assert security assurances similar to ours, and we ensure their access to data is strictly limited to only what they require. Zeplin's Privacy Policy is publicly available online.

Zeplin uses a certified partner to handle all credit card information, and do not store any PCI-DSS information ourselves. Our processor, Stripe, is certified to PCI Service Provider Level 1, the most stringent level of certification available in the payments industry.

Physical and Network Security

All customer data, and Zeplin's servers, are securely hosted on Amazon AWS in the U.S. All of our users' data is being processed in the U.S.

AWS certifies their physical security with comprehensive compliance and controls, including allowing physical access to personnel with a validated business need, logged and monitored access, electronic surveillance and professional security personnel at all data center entry points. AWS is accredited against multiple security industry certifications including ISO27001.  More details are available from the AWS website.

Each and every connection made to Zeplin is end-to-end encrypted over HTTPS, using TLS 1.2. Zeplin forces HTTPS for all services, including our public website. Customer data is stored in containers encrypted with AES256-CBC (or 256-bit Advanced Encryption Standard in Cipher Block Chaining mode) in multiple physical locations within the United States. Our policy for encryption for data in transit and at rest is available online.

Operational Security

Far from being an afterthought, security is an integral part of our operations.

Access Control

For employees, all staff members have a unique username/password. Access to all systems is role-based, with the principles of deny-by-default and least-privilege. Multi-factor authentication is mandatory when accessing sensitive systems.

Change Management

Planning, analysis, and design are carried out amongst all developers at regular meetings. We make significant use of GitHub and a CI tool, CircleCI. All code is reviewed by a team at the time of commit. The CI runs automated tests and pushes to an AWS instance, where it is beta-tested for a week. After success, it is code-reviewed, automated tested again, and then needs manual clearance from one of four senior staff to be released to production. User feedback and monitoring tools report back to the planning phase.

Monitoring

Zeplin is built on top of AWS, and we take advantage of many AWS network and application security services, including vulnerability scanning, monitoring, alerting, intrusion detection and configuration checks. In addition, we have constant automated security compliance checks carried out by our Compliance tool, and logging in services like LogDNA and NewRelic. For real-time detection and protection, we implement an IDS/IDP that monitors network access in real time, alerts of suspicious activity, and actively defends against attacks against our back-end system, including saving data for forensic analysis.

Vulnerability Management

Zeplin's infrastructure is constantly scanned for network vulnerabilities using AWS and other tools, and code versions are checked daily against published security notices. Patches for any security issue are evaluated and rolled out, via change management, as soon as possible.

Incident Management

We rapidly investigate all reported security issues. In compliance with international regulations, we will inform all customers affected by an incident as soon as possible - definitely within legally mandated notification periods of 72 hours.

Failover and Backup

Automatic backups are built into our system. If a single server fails, another one will take over instantaneously. All data is backed up daily to a different physical location, and stored encrypted. Should the worst happen—such as losing a data center—we can rebuild all Zeplin data in a new location, and be fully operational within five days.

Vendor Management

Our vendors are all evaluated on their security controls in place, and compliance is reviewed regularly. If we need to use a vendor, we make sure that their security is the same or better than our own, and the appropriate compliance requirements are met.

Application Security

Our application is built with security-by-design. Customer data may only be accessed through the application layer, and whether via the UI or an API, user access controls are enforced for every communication.

Access Control

Zeplin users are the owners of their project. They have control to invite, allow access to, or remove access to that project at any time. All users need a username/password combination. Users self-register to the Zeplin platform, are validated via an email verification, and must supply a password of more than 6 characters. No customer or employee password is ever stored in the clear at any time in any cache, file, database, or access log.

All data in Zeplin is segregated and sandboxed. Only you and your team can reach the resources you created. The Zeplin back-end controls all access to stored data, and checks and enforces permissions for every network request.

Mobile Device Security

Zeplin is a desktop and a web app. There is no mobile app component.

Secure Software Development

We do code reviews very seriously and heavily, it takes 30% of our development time, and we don't compromise on it. Zeplin works as an open source project team in terms of code reviews. Every single branch, feature, and release are reviewed by many team members, and the Pull request needs to be approved by at least one senior engineer within the same team. Integrations and/or unit tests need to be fully completed, and pass testing, before opening the Pull Request.

We use CircleCI for our back-end and front-end stacks as a continuous integration service, deployments, and auto testing tool. Zeplin's code is hosted in GitHub's private repositories, and we take very good advantage of GitHub's code review tool.

Zeplin's stack is fully on native HTML, JavaScript on Web app, Swift on macOS, and Node.js on the back-end, with MongoDB as the main database for Zeplin's core applications. Zeplin is not vulnerable to traditional SQL vulnerabilities, such as SQL injections.

Every three months, we carry out security training for the engineering team, so everyone is aware of the possible flaws could happen in our stack, and to be fully sure that none of the applications are affected. We review every single application at those training sessions, and discuss ways to improve and automate the reviews.

Regulatory Compliance

Zeplin are working very hard toward achieving attestation to the American Institute of CPAs industry-standard cybersecurity program, SOC-2. Formalisation and compliance to the controls is underway, and we aim to be ready for audit in H2 2019.

References

Privacy Policy
Terms of Service
Security FAQ

Did this answer your question?