2020 Veracode Information Security Exhibit (VISE) - 1
2020 Veracode Information Security Exhibit (VISE) - 1
DOCUMENT HISTORY
This document is reviewed and updated on an annual basis. The following table lists the previous and
current revisions to this document in chronological order. For each revision, one or more contributors
are listed and the changes to the document briefly described.
The most recent revision is the last entry of the table below and that version is printed in the footer of
each page of the document.
DATE OF
VERSION APPROVAL AUTHOR DESCRIPTION
Version 3.0 8/1/2015 Jeff Horan, CISSP & CISM Manager, Information Security & Compliance
Version 4.0 8/1/2016 Jeff Horan, CISSP & CISM Manager, Information Security & Compliance
DOCUMENT SIGNOFF
APPROVER NAME DATE
TABLE OF CONTENTS
Introduction
The Veracode Information Security Exhibit (Exhibit) was developed to demonstrate Veracode’s
commitment to the protection of information entrusted to Veracode and its subcontractors, and to
outline how the information security safeguards appropriately protect non-public information in
connection with those relationships and associated information systems.
The information contained in this document details the Information Security Program Veracode has
implemented to protect information assets and ensure its Information Security Program objectives
are achieved.
Information Security Program policies and standards derive from the company’s information
security risk management process, legal and regulatory requirements, industry standards, and the
nature of the company’s activities.
The Veracode Chief Information Officer (CIO) / Chief Information Security Officer (CISO) is
responsible for:
Veracode recognizes that the information security landscape is constantly changing, and that
management must implement, interpret, and, at times, modify the control documents to reflect the
changing security landscape.
The Information Security Program policies, procedures, and exhibits provided in this document are
the basis for ensuring the security and the protection of information and related technologies.
The policies summarized in this document set forth the organizational standards and provide
direction to management and employees for achieving the following security program objectives:
Confidentiality: Ensures protection of customers and Company data against unauthorized use.
Integrity: Ensures information has not been altered in an unauthorized manner and systems are
free from unauthorized manipulation that will compromise accuracy, completeness, or reliability.
Availability: Ensures authorized users have prompt access to information and information assets
and resources are available as established.
COMMUNICATION
The Veracode Information Security Oversight Council (ISOC) is responsible for defining the
requirements for protecting information and communicating these requirements to management
through executive presentations, intranet, training, and new employee orientation. This document is
provided by Veracode’s account management or customer service organizations. Questions and/or
comments concerning this document should be directed to the appropriate Veracode relationship
manager.
External requests to review the Information Security Program policies, procedures and standards
must be communicated to Veracode and will be considered on a case-by-case basis.
Set forth the minimum information security requirements required for the protection of non-public
information and processing systems
These policies apply to all Veracode management, employees, and contractors (“employees”).
Compliance with the Veracode Information Security Policy, Veracode Information Confidentiality
Policy, and associated standards is mandatory. Additionally, management shall apply provisions to
agreements and contracts with business partners and service providers reflecting appropriate
elements of these policies. Failure to comply with these policies may result in disciplinary or other
adverse action including, where appropriate, termination of employment or business relationships.
Unless specifically expressed to the contrary, information and data refers to all information
processed, stored, used, or transmitted in any medium or form. Information systems refers to all
networks, computers, software, hardware, electronic messaging systems, fax or copy machines,
mobile devices, voice mail, telephones, cellular phones, and similar devices owned, operated, or
managed by Veracode.
SUMMARY
The Veracode Information Security Exhibit (Exhibit) is a collection of frequently requested
customer-facing documentation that outlines Veracode’s Security, Risk, and Compliance controls.
The Exhibit is reviewed and updated at minimum annually by:
Legal
Compliance
Human Resources
As a result, it is recommended that new Exhibit versions be obtained on an annual basis to show
the changes to Veracode’s Security, Risk, and Compliance posture.
EXTERNAL REFERENCES
Trust Services Principles, Criteria, and Illustrations -- Assurance Services Executive Committee
(AICPA)
The Standard of Good Practice for Information Security, Information Security Forum (ISF)
With its combination of automation, process and speed, Veracode becomes a seamless part of the
software lifecycle, eliminating the friction that arises when security is detached from the
development and deployment process. As a result, enterprises can fully realize the advantages of
DevOps environments while ensuring secure code is synonymous with high quality code.
Without the need for additional staff or equipment, Veracode customers ramp up quickly, see
results and prove value on day one, and consistently see improvement over time. This is due to the
company’s combination of,
Process: Our goal is to work with your security and development teams to create an
advanced program – one that reduces risk across your entire application landscape and
accelerates your business. By embedding into your existing software development
workflow, Veracode can ensure assessments and vulnerability remediation are completed
during logical points throughout your distinct process. This seamless integration with
legacy APIs has resulted in as much as 90% or greater reduction in remediation costs for
our customers.
Platform: The power of the Veracode Platform is in its scalability, integrations with
development tools and its ability to ensure security policies are consistently enforced
across the enterprise. While some companies talk about scanning 10,000 applications
overall, we scanned that many applications for a single customer. Yet, the platform won’t
slow down your development cycles, 60% of all Veracode’s static assessments finish in
less than an hour, 80% in less than 4, and more than 90% are ready overnight. All our
customers benefit from the knowledge that comes with assessing 1.7 trillion lines of code.
With each new scan, the platform gains institutional knowledge which it calls-upon for
future assessments.
People: The security industry faces a significant skills gap – there aren’t enough security
experts. Working with Veracode you gain access to some of the top security experts in the
industry. These experts can offer strategic advice for building a scalable and program, help
execute the program, and then provide remediation coaching for when flaws are found. In
2015 Veracode’s security experts helped fix 70% of all vulnerabilities found, from read-out
calls alone customers saw a 2.5X improvement in remediation.
Veracode was founded in 2006 by a world-class team of application security experts from @stake,
Guardent, Symantec, and VeriSign. The core technology of our on-demand service was developed
in 2002 at the security consultancy @stake to automate application security assessments and now
forms the backbone of application risk management from Fortune 500 organizations to mid-market
enterprises worldwide.
Veracode Proprietary and Confidential > 2020 Q3 < 8
> COMPANY OVERVIEW, PRODUCT AND SERVICE SUMMARIES
Veracode has received considerable recognition and awards in the industry including being named
a Gartner “Cool Vendor,” The Wall Street Journal’s “Technology Innovation Award,” The Banker’s
“Information Security Project of the Year” with Barclays, SC Magazine’s “Best Vulnerability
Assessment Solution,” Information Security “Readers’ Choice Award,” and Always On Northeast's
"Top 100 Private Company.”
Competing in business is all about speed of innovation. No matter what industry you’re in, that
innovation relies heavily on leveraging software. However, most applications were not created with
security in mind, which is why applications are the most common breach vector. Looking at a giant
backlog of insecure applications can be overwhelming. Training developers to write more secure
code, testing applications, and collaborating on remediation is very challenging because application
security expertise is very hard to find. Even worse, developers may not be cooperative if they
believe that you only point out their mistakes and delay their projects.
The Veracode Application Security Platform offers a holistic, scalable way to manage security risk
across your entire application portfolio. We offer a wide range of security testing and threat
mitigation techniques, all hosted on a central platform, so you don’t need to juggle multiple vendors
or deploy tools. Application security cannot be solved with technology alone. Our security program
managers work with you to define policies and success criteria, so you’ll have a strategic,
repeatable way to tackle your application security risk. Veracode educates developers with
actionable results, one-on-one coaching, and a variety of training, so they can effectively fix
existing flaws and code securely moving forward.
Veracode Greenlight - Get Secure Coding Feedback in Seconds – Right in Your IDE.
Veracode Greenlight finds security defects in your code and provides contextual remediation
advice to help you fix issues in seconds, right in your IDE. Leveraging our proven, and highly
accurate static engine, Veracode Greenlight offers immediate results and scales to your needs.
You do not need to provision any servers or tune the engine. It simply scans in the background and
provides accurate and actionable results, without taking up resources on your machine. With
Veracode Greenlight, find issues early, reduce development and remediation costs, and release
your code on time – at the speed of your DevOps process.
Veracode Static Analysis - Manage application security risk in a simple, strategic, scalable way.
Veracode Static Analysis enables your developers to quickly identify and remediate application
security flaws without having to manage a tool. Thanks to our SaaS-based model, we increase
accuracy with every application we scan. Veracode’s patented technology analyzes major
frameworks and languages without requiring source code, so you can assess the code you write,
buy or download, and measure progress in a single platform. By integrating with your SDLC tool
chain and providing one-on-one remediation advice, we enable your development team to write
secure code. The Developer Sandbox feature enables engineers to test and fix code between
releases without impacting their compliance status.
Veracode Web Application Scanning - Discover and assess risk of thousands of corporate
websites.
Veracode Web Application Scanning (WAS) offers a unified solution to find, secure, and monitor all
your web applications – not just the ones you know about. First, Veracode discovers and
inventories all your external web applications, then performs a lightweight scan on thousands of
sites in parallel to find critical vulnerabilities and helps you prioritize your biggest risks. As a second
step, you can run authenticated scans on critical applications to systematically reduce risk while
continuously monitoring your security posture as part of the SDLC. Veracode offers multiple
scanning technologies on a single platform, so you get unified results, analytics, and increased
accuracy.
Veracode Runtime Protection - Detect and block attacks against applications in real-time.
Veracode Runtime Protection defends against application-layer attacks in real-time. Unlike a WAF,
Veracode Runtime Protection is simple to deploy and does not require engineering resources to
implement and tune it because it uses a technology called runtime application self-protection
(RASP). Veracode Runtime Protection provides more effective protection, is harder for attackers to
evade, and has much higher accuracy – so you won’t be distracted by noisy false positives. You
can even deploy it in pre-production to ensure its functionality is tested as part of your QA process.
Third-party and legacy applications can be secured without requiring code changes or interrupting
engineering priorities.
Veracode Vendor Application Security Testing - Assess Security of the Software You Buy.
Veracode Vendor Application Security Testing (VAST) provides a scalable program for managing
third-party software risk. Build your program based on a decade’s worth of best practices to ensure
success and see a simple pass or fail for each vendor application. Because Veracode scans
binaries rather than source code, vendors will be more comfortable with the assessments because
they don’t have to disclose their intellectual property. With Veracode, you can scale your program
without adding specialized headcount and manage the entire program on a single platform.
Strong security means more than having powerful technology. Our services help developers rapidly
identify, understand and remediate critical vulnerabilities — and help transform decentralized, ad
hoc application security processes into ongoing, policy-based governance.
Integrations:
Veracode Security Program Management - Ensure quick successes with experienced security
program management and scale your application security program without adding headcount.
Veracode Security Program Management (SPM) helps enterprises map out their strategy and
deliver results with. Veracode has been involved with thousands of application security programs
over the past 10 years. We help you with security program readiness and execution, so you don’t
have to find and retain highly specialized talent. As a result, we see customers who use Veracode
SPM grow their application coverage by 25% each year, decrease their time to deployment and
achieve better scan and remediation metrics. Most importantly, our security program managers
ensure that your program stays on track to meet your strategic goals.
Veracode Remediation Advisory Solutions - Get an application security expert to advise your
development teams and benefit from a deeper vulnerability analysis with dedicated consultants.
Veracode Remediation Advisory Solutions (RAS) provide application security experts with a
development background that act as a “personal trainer” for your engineering team. Unlike services
that assign different resources for each vulnerability, the same Veracode RAS consultant will work
on all vulnerabilities of a specific application to provide a deeper level of analysis and so you don’t
have to start from square one on each call. Your developers will learn secure coding practices in
their environment and process, decreasing the number of flaws over time, leading to cost savings
for you and your organization.
Veracode Developer Training - Grow your developers’ skills and become more secure in the
process.
Remediate 30% more vulnerabilities with developer training and Reduce costs by trained Veracode
Developer Training empowers developers, testers and security leads to develop secure
applications, providing the critical skills they need to identify and address potential vulnerabilities.
Veracode offers three styles of teaching that reinforce each other. Instructor-led training offers real-
time training that’s tailored to your organization. On-demand training is integrated with the
Veracode Application Security Platform and allows developers to learn when and where they need
it. And just-in-time training offers refreshers and contextual recommendations to help developers fix
vulnerabilities. Development organizations that leverage Veracode eLearning see a 30 percent
higher vulnerability fix rate training developers on application security.
CRYPTOGRAPHY SUMMARY
For an understanding of how Veracode secures customer data in its custody please
see the Veracode Cryptography Primer dated June 30, 2020.
Delineation of key roles & responsibilities related to information security and confidentiality
Information security and confidentiality policies that provide organizational direction and
establish baseline information security and confidentiality controls and procedures
A process that individuals can use to report security and confidentiality defects and non-
compliant practices without fear of retribution or reprisal.
Executive Management
Veracode Executives have a fundamental responsibility to manage business risks in a proactive
fashion consistent with the best interests of both Veracode and our customers. Consequently,
Veracode Executives have a vital role in the effective implementation and management of
safeguards necessary to address information confidentiality and security risks.
Monitor the overall state of information security and confidentiality safeguards through
regular discussion of key information security activities and exploration of significant
information security risks
Establish and maintain a mechanism for individuals to report, without fear of retribution or
reprisal, practices that are contrary to organizational policy, laws, regulatory requirements,
or ethical business practices; renders information or associated processing systems
vulnerable to compromise; and, similar security defects
Model and promote the highest standards of business conduct providing demonstrative
support for, and commitment to, the information security program
Allocate sufficient resources and staff to support information security and confidentiality
controls and approved initiatives
Communicate and enforce information security and confidentiality policies and standards
ensuring that subordinate managers, employees, and contractors receive the direction and
guidance necessary to fulfill their individual responsibilities.
In addition to the general responsibilities outlined above, select Executives have been delegated
specific additional responsibilities related to administration and management of the information
security and confidentiality program within Veracode:
Serve as a senior-level advisor providing technical support, subject matter expertise, and
industry guidance related to security operations and management
Serve as the primary management focal point during incident response activities resulting
from production operations
Serve as the primary management focal point during incident response activities resulting
from customer-initiated events
Design, implement, and manage technical, physical, and procedural controls affecting
information security and confidentiality safeguards within their span of control. Specific
areas of focus are:
o Customer support
Coordination of information security and confidentiality activities with the hosting service
provider
Serve as a senior-level advisor providing technical support, subject matter expertise, and
industry guidance related to security operations and management
General Counsel
Responsibilities
Schedule and conduct quarterly meetings to address Veracode’s information security and
confidentiality program (more frequently, if required)
Provide leadership and management coordination during the development of information security
and confidentiality policies, standards, and guidelines
Review and approve changes to Veracode’s information security and confidentiality policies,
standards, and guidelines
Design and implement a set of key performance indicators (security metrics) to provide ongoing
monitoring of the effectiveness of information security and confidentiality controls and the overall
level of information security risk within the Veracode environment.
Validating production changes are compliant with security and confidentiality policies
The team is co-led by the Chief Information Officer / Chief Information Security Officer and
Chief Technology Officer with support drawn, as necessary, from across Veracode.
Responsibilities
Tactical cross-functional product teams who assess immediate and emerging threats to
Veracode’s Products & Services Systems
Provides opportunities for collaboration between Research and Engineering on new and
existing security initiatives
o Comprised of Security Champions who are sources of security expertise for their
team to embed security more deeply into the SDLC
High Risk: A condition meeting one or more of the following criteria in which the likelihood and
severity of risk realization is generally high representing a significant risk to Veracode.
Moderate Risk: A condition meeting one or more of the following criteria in which the likelihood
and severity of risk realization is generally moderate, low, or unknown representing a moderate risk
to Veracode.
Does not subject Veracode (or Customer) Sensitive information to potential compromise or
improper disclosure
Limits the volume of Veracode (or Customer) Proprietary information subject to potential
compromise or improper disclosure
Does not materially alter the effectiveness of technical security controls or monitoring
across a group of systems
Low Risk: A condition meeting one or more of the following criteria in which the likelihood and
severity of risk realization is generally low representing a minimal risk to Veracode.
Does not materially alter the effectiveness of technical security controls or monitoring
across a group of systems
Notably, the risk levels are themselves arbitrary classifications used only to assist
employees in the selection of security controls, to establish the degree and formality
required for Management oversight, and to help employees determine and escalate risks to
the appropriate level of Management for approval or resolution.
Business requirements
While the depth and formality of the risk analysis may vary significantly based on the
nature of the change, the goal is to provide Veracode Management with sufficient
information necessary to make an informed decision regarding the need for mitigating or
compensating controls, risk transference, or risk acceptance.
The ISOC must formally document, track, and periodically report on the status of all information
security-related high-risk issues involving any aspect of Veracode’s operations as well as
moderate-risk issues noted in the production environment.
When it is not feasible or cost effective to mitigate or transfer risk, Veracode may accept the risk as
outlined in Table 1 shown below.
RISK LEVEL
Written Approval
ISAT (Production)
Chief Information Officer / Chief Information No Yes Yes
Security Officer (Corporate)
Veracode must provide the third-party with appropriate guidance related to the security
requirements applicable to the information accessed or disclosed including, if appropriate, third-
party participation in security awareness and training activities conducted by Veracode.
As a rule, Veracode would expect and hold the third-party to safeguarding standards that are
comparable to those within Veracode and outlined in this policy. In situations when the nature of
the services provided by the third-party or the sensitivity, criticality, and volume of information
warrant, Veracode may require additional assurances or independent verification of the third-
party’s safeguarding capabilities prior to disclosure and, if appropriate, at reasonable intervals
thereafter. These additional activities may include one or more of the following:
Evaluating the scope and applicability of industry attestations and certifications (for
example, SSAE 18, SysTrust or ISO 27001)
Reviewing recent audit and assessment reports related to the third-party’s safeguarding
capabilities
Security Policy
Policy Structure
Veracode’s policy structure and framework employs a hierarchical approach with a foundation of
general organizational direction applicable to all employees and functions coupled with more
detailed standards and procedures relevant to specific functional areas and processes. The policy
management framework consists of several related components that collectively comprise
organizational information security and confidentiality policy.
The VISP and VICP serve as a bridge between high-level strategy based on analysis of applicable
statutory or regulatory requirements, business objectives, market drivers, and technical capabilities,
and granular guidance provided within Information Security and Confidentiality Standards and
Guidelines while remaining consistent with other Veracode policies
Absent an approved policy deviation, employee and contractor compliance with the VISP and VICP
is mandatory
The VISP is organized in distinct sections aligned to the key information security control areas
outlined below:
Information Security and Confidentiality Standards link back to specific sections within the
VISP and VICP
Information security and confidentiality guidelines will link back to either a section within the
VISP/VICP or a specific Information Security/Confidentiality Standard and are generally
applicable to specific processes, functional areas, and operating environments.
Operating Procedures
Operating procedures allow for local supplementation of information security and
confidentiality policies and standards, are less formal, and narrowly apply to a single
system or process
Any level of management responsible for a specific system or process may implement
documented operating procedures
The ISAT is responsible for validating production related operating procedure compliance
with the security and confidentiality policies
Operating procedures are reviewed annually by the ISAT and the results are reported to
the ISOC.
The ISAT is responsible for approving production related operating procedures and
compliance with security and confidentiality policies, exceptions are reported to the ISOC.
Policy Deviations
Veracode designed the information security and confidentiality policies and standards to meet
specific business objectives and to comply with applicable legal, regulatory, and customer
requirements. As such, policy deviations require thorough investigation and analysis so that
Veracode Executive Management can make informed decisions based on the risk introduced by
the policy deviation.
Requester
Individual’s seeking a deviation from approved policy must submit a documented request through
their immediate manager to the Information Security Assessment Team for consideration.
Describe the proposed process and identify the specific policy provision(s) for which a
deviation is required
Review the request and verify the circumstances surrounding the deviation request
Explore, identify, and coordinate options for providing alternative or compensating controls
Assess the residual risk associated with the policy deviation after application of available
mitigating or compensating controls
o Reject the request providing a brief explanation of the rationale for the decision
o Accept the residual risk and approve the request providing a detailed explanation
of any mitigating or compensating controls required in connection with the approval
and the timeframe for which the policy deviation is authorized (not to exceed a
period of six (6) months without re-evaluation of the request)
Re-evaluate the ongoing need for the deviation upon expiration of the authorized deviation
period or after six (6) months, whichever occurs first
Maintain an inventory of all authorized deviations that are in effect and a record of all such
decisions for a period of two (2) years.
Policy Maintenance
Veracode will periodically review, and if necessary, update information security and confidentiality
policies and standards to help ensure that they remain useful, continue to accurately reflect
Veracode’s business and technical environment, and incorporate all applicable statutory and
regulatory requirements.
At a minimum, the Information Security Oversight Council will initiate and coordinate an
annual review of and, if appropriate, update to information security policies and standards
The ISAT will perform an annual review all production related operating procedures for
compliance with security and confidentiality policies
Additionally, the Information Security Oversight Council is responsible for initiating policy
reviews and updates based upon ongoing analysis of employee-suggested policy changes,
policy deviation requests, or in the event of major changes in the technical infrastructure,
operating processes, legal or regulatory landscape, customer requirements, or Veracode’s
risk tolerance
If substantive updates are required, the Information Security Oversight Council will
coordinate changes with Executive Management and will reissue the affected information
security policies and standards along with appropriate organizational communications
outlining the changes
The Information Security Oversight Council may make non-substantive changes (such as
spelling and grammar changes that do not change the meaning or intent of the document)
without collaborative review or notification.
Safeguards are prudently applied, managed, and monitored across their span of control
o Ensure staff are provided an initial orientation that encompasses security and
confidentiality related requirements
o Ensure that staff receive periodic updates when significant changes occur in the
regulatory requirements, policy content, technical environment, or supporting
processes
o Ensure that staff are reminded of their security and confidentiality responsibilities
during performance management activities
Appropriate actions are taken upon a significant change in an individual’s security-related
responsibilities or termination of the employment relationship.
Employees
Become familiar with the information security and confidentiality policies, standards, and
guidelines applicable to the individual’s organizational responsibilities and specific job
function(s)
Asset Management
INFORMATION ASSET CLASSIFICATION AND CONTROL
Classifying critical or sensitive information and the systems that process that information
(“information assets”) provides a means to assign and manage safeguards appropriate for that
classification level or protection profile. Proper classification and handling of information assets
also helps to preserve Veracode’s legal rights related to intellectual property, satisfy customer
expectations and contractual obligations related to the protection of their sensitive information, and
meet legal and regulatory requirements related to the protection of personally identifiable
information and certain types of business information.
The Veracode Information Confidentiality Policy (VICP) provides rules for information classification
and associated handling guidelines to ensure confidentiality of information belonging to Veracode
as well as information belonging to third parties.
This policy provides a security classification framework and guidance for information systems
managing confidential information.
Asset Management
o Asset Ownership and Inventory
o Asset Protection Profiles
Acceptable Use of Information and Assets
Asset Management
An accurate inventory and assigned ownership of important information assets is necessary in
order to proactively monitor, manage, and oversee safeguards associated with non-public
information and related processing systems.
Encompasses those systems comprising or integral to the security of the production environment
including:
Encompasses information systems that play an important role in the protection of the corporate
environment or whose sensitivity or criticality warrant more robust controls including:
Corporate
Internet-accessible hosts/devices
CRM Application
Corporate Email Server
Code repository file servers
QA and Staging
Employee, Contractor and Customer Personally Identifiable Information
o Personally Identifiable Information (PII) means an individual’s first name and last
name or first initial and last name in combination with any one or more of the
following data elements that relate to such individual:
Social Security Number or similar government identifying number;
Driver’s license number or other government-issued identification card
number.
A financial account number, or credit or debit card number, with or without
any required security code, access code, personal identification number or
password, that would permit access to such individual’s financial account
for which Veracode has developed, implemented, and maintains a
comprehensive information security program reasonably designed to
comply with the provisions of Massachusetts 201 CMR 17.00: Standard for
the Protection of Personal Information of Residents of the Commonwealth.
Encompasses all Veracode owned or operated systems not otherwise assigned to PP1 or PP2
including:
Corporate
All other application servers
File and printer servers
Desktops and workstations.
Pre-employment processing
o Security responsibilities in role/position descriptions
o Pre-employment screening (background investigation)
o Terms and conditions of employment
PRE-EMPLOYMENT ACTIONS
Clear Definition and Communication of Security Responsibilities
Veracode will define and communicate the nature of an individual’s role and responsibilities, with
particular emphasis on security-related aspects of the position, prior to the actual hire or start date.
This information will serve not only to frame interviews so that the prospective employee’s
knowledge, skills, and abilities can be properly evaluated, but will also guide the depth of
investigative research required during pre-employment screening. These responsibilities will be
incorporated into performance management discussions during the period of employment.
Veracode reserves the right to tailor the scope and depth of the pre-screening verification process
based on the individual’s specific role, degree of access to non-public data and sensitive
processing facilities, and the perceived risk posed by an individual in that position.
Background verification checks will focus on verifying criminal, credit, and employment history for
the preceding seven (7) year period except that such checks will not extend earlier than the
individual’s 16th birthday.
Adopt a “clear desk” policy to ensure that documents and removable media containing
non-public information is not inadvertently left unsecured in user work areas
Additionally, employees must also exercise care to reduce the possibility that malicious logic or
unauthorized mobile code is introduced into the Veracode environment (particularly when
attachments or links to external sites are included in unsolicited email from unknown sources.
The Introduction and Use of Hardware
Unless specifically approved to the contrary, Veracode prohibits the installation and use of
hardware not owned by or under the control of Veracode. However, access to the corporate
network from home office environments under the control of Veracode employees is permissible
provided the connection method is approved by Veracode Management and the user
acknowledges and agrees to their obligations for safeguarding information accessed in that
manner.
Examples include:
Any other materials, whether found on the Internet in other electronic formats, or in
traditional media, that were not produced or developed by Veracode
Material that may require permission or license from the owner before they can be
reproduced, displayed, performed or distributed.
The software is properly scanned or evaluated for the presence of malicious logic prior to
or at the point of introduction into the Veracode environment
Veracode employees and contractors with remote access privileges must ensure that their
Veracode-owned workstation remains secure, free of malware and remains in compliance with all
applicable corporate policies.
The use does not interfere with the employee's work performance, or pre-empt Veracode
business activity
The use does not interfere with another employee's work performance
The use does not have undue impact on the operation of the information asset
The use is not for the purpose of operating a side-business or similar venture primarily
focused on providing personal gain (reasonable levels of equity trading and similar activity
is permissible at the discretion of Veracode Management)
The use does not violate any other provision of Veracode policies.
Right to Monitor
While Veracode permits the limited non-business use of company information assets, the company
retains ownership and control of the information assets and users have no right to or expectation of
privacy. Veracode reserves the right to monitor, access, and review any aspect of its information
asset usage.
Reporting Security and Confidentiality Incidents
Employees are responsible for ensuring that they promptly report security and confidentiality
incidents to the Information Security Assessment Team (ISAT) by emailing to sg-isat or Veracode
Management.
Unless Veracode Management instructs otherwise, employees must treat information related to
security incidents as sensitive information and restrict disclosure of that information to only those
Veracode employees with appropriate need-to-know.
Whenever possible and supported by the information system, select passwords of appropriate
length (preferably, 8 or more characters) and complexity (using a combination of upper and lower
case characters, special characters, and numbers).
As a general rule, passphrases should not be written down or printed unless they are stored in
appropriately secured desks and file cabinets.
Users must handle passwords, PINs, tokens, and similar identification & authentication credentials
at the highest classification level accessible using them.
Users must adhere to more stringent password policies if required by separate networks, systems,
and applications.
As a general rule, all devices used for company business need to be password protected. This
includes smart phones, laptops and desktops. Passwords should conform to the guidelines
provided above in this section.
Treatment of Violations
Violations will be treated as a performance issue and may result in disciplinary action, up to and
including termination of employment in accordance with applicable corporate policies or, in the
case of Contractors, termination of the contractual or other business relationship.
Except as otherwise provided by this Policy, Personnel must treat Corporate Information as
confidential. Personnel may disclose Corporate Information only in accordance with this Policy.
Personnel must maintain the confidentiality of Corporate Information even after they no longer work
for Veracode.
Corporate Information that constitutes Confidential Information requires a particularly high standard
of care, as discussed below.
Databases and similar collections of Corporate Information constitute Confidential Information even
if they include or consist of Public Corporate Information. As a result, while Personnel may freely
disclose publicly available data elements from a database for Veracode business purposes (to the
extent legally permissible), the database itself and any material aggregations of data from the
database should be treated as Confidential Information.
Note: Certain information that is publicly available (such as certain publicly available personal
information concerning clients and other individuals) constitutes Confidential Information, rather
than Public Corporate Information, because its disclosure is restricted under applicable law.
Personnel must comply with all applicable laws and corporate policies.
Note: The lack of a “CONFIDENTIAL” label does not relieve Personnel of the
responsibility to treat Confidential Information as such.
Ensure that agreements with third parties contain appropriate protection for
any Confidential Information that may be disclosed under the agreements.
(See Non-Disclosure Agreements, below.)
Comply with any restrictive legends (e.g., “Do Not Reproduce”) appearing on
any documents and databases that contain Confidential Information.
Limit the number of copies made of Confidential Information to those that are
necessary to accomplish the business purpose.
Use external email accounts (i.e., Hotmail, Yahoo, AOL), Instant Messengers
(i.e. AIM, Yahoo IM), or other external resources to store or transmit
Confidential Information.
Within the first fifteen (15) business days of their employment or engagement, all new
employees and contractors will receive an orientation that includes relevant aspects of their
security and confidentiality responsibilities
At least once a year, employees and contractors must also participate in awareness
activities sponsored by the ISOC periodically throughout the year including monthly online
security awareness training relevant to the evolving information security threat landscape
Employee and contractor participation in such events shall be recorded by their Manager
and noted, as appropriate, during performance appraisals
Allocations will be made for key employees to receive specialized external training as
necessary in order to support the security and confidentiality policies.
Veracode Management must also ensure that employees and, if appropriate, contractors and third
parties, receive relevant security updates throughout the year. The objective of these activities is
to provide employees with current information necessary for them to understand and comply with
their security responsibilities.
Provide regular communication that reinforces key security concepts, outlines current
threats, and discusses strategies to mitigate or eliminate those threats
Introduce and highlight recent or proposed changes in the legal and regulatory
environment as well as changes in Veracode’s security and confidentiality policies,
practices, or supporting infrastructure
Monitor the performance of key employees and identify instances where additional
specialized training may be required.
While the specific security awareness content will vary depending on the audience, objectives, and
content delivery mechanism used, security awareness activities will include and reinforce the
following key security concepts:
POST-EMPLOYMENT ACTIONS
When the nature of an employee, contractor, or third-party user’s responsibilities significantly
change or when the employment/working relationship is terminated, Veracode must take prompt
action to ensure that individual access authorizations to facilities, networks, systems, and
information are appropriately modified or revoked, and, if applicable, that company-owned assets
are returned.
Responsibilities
Manager
Determine and communicate the requirements for transfer, storage, archival, or deletion of
electronic files and records
For job changes, the gaining Manager is responsible for outlining the security-related
responsibilities and obligations of the new role or position and requesting access to
facilities and systems, as appropriate.
HR/Finance/Facilities/Administration
Coordinate or conduct the exit interview reminding the individual of their continuing
obligation to safeguard non-public information for which they had access during their
employment with Veracode
Serve as the primary point of contact with the individual until all required actions are
completed.
Network/Application/System Administration
Take actions necessary to transfer, store, archive, or delete electronic accounts, files, and
records.
Employee/Contractor
Promptly return all company assets provided in connection with their work at Veracode
Continue to safeguard, and to treat as confidential, all non-public information for which they
had access during their tenure at Veracode.
Return of Assets
If applicable, employees and contractors must return all company-owned assets provided in
connection with their work at Veracode. Managers or their designated representatives are
responsible for collecting all company-owned property provided to, or under the control of, the
terminating employee or contractor.
Office Supplies
Corporate IT Systems
Veracode uses facilities of appropriate physical construction and employ physical security and
environmental control measures at its Corporate facility, to provide a safe work environment and
reasonably preclude unauthorized access to, damage of, or interference with Veracode operations,
property, systems, and information.
Information sent / received via fax, postal / courier mail are processed / stored in a secured
environment
Maintain visitor logbook in reception area, require all visitors to sign-in, and retain visitor
logbooks for one year
Issue temporary badges to visitors, with either an “Escort Required” or “No Escort
Required” designation on the visitor badge
Visitors are not authorized to admit any person (including persons with Veracode photo
identification badges) into any facility. Visitors are to use only authorized entrances and
exits
Require visitors to return their badge to Veracode personnel at the conclusion of the visit
All employees, contractors, and third parties are expected to wear the identification badges
issued to them. Anyone without a visible badge will be politely requested to produce it and
wear it
Locate and protect equipment in a manner that minimizes risks from environmental threats
and hazards and reasonably precludes opportunities for unauthorized access
Route and protect power and telecommunications cabling carrying non-public data or
supporting information services in a manner that minimizes the likelihood of damage or
unauthorized interception
Properly maintain equipment to ensure its continued safe operation and the availability and
integrity of critical or sensitive information
Check all equipment containing storage media to ensure that non-public information and
licensed software has been removed or securely overwritten prior to disposal
Use secure storage containers provided for the disposal of documents that contain non-
public information
Continuous datacenter operation is ensured by multiple power feeds, UPS devices and backup
generators. Backups of database customer metadata are performed incrementally throughout the
day and encrypted with 128-bit AES before being transmitted to off-site storage daily. In the event
of a datacenter disaster, any pending scans will require that their binaries be re-uploaded to the
failover datacenter. As a result no one with access to the backup systems can access an
unencrypted copy of sensitive customer data.
All systems within the service system are set up and managed by experts according to industry
best practices where hardened configurations are used to limit unnecessary attack vectors. All
configuration activity follows a formal process that encompasses documentation, testing, and
approval. Only authorized personnel are allowed to set up and manage systems. Operating system
patches are monitored and applied as necessary to maintain the highest level of security.
General requirements
Responsibilities
Veracode distributes responsibility for managing the network security architecture depending on
the environment involved.
Corporate Network: Management and oversight of the corporate network rests with the
Veracode’s Chief Information Officer / Chief Information Security Officer
Consider the legal, regulatory, and business requirements related to the network design
Consider the type, function, configuration, assigned protection profile, and associated
baseline controls for the systems and devices affected by the network design
Technical controls
Veracode Proprietary and Confidential > 2020 Q3 < 48
> COMMUNICATIONS AND OPERATIONS MANAGEMENT
Interoperability: Network designs must consider and, if necessary, compensate for the
affect the network design has on existing network management, security, and audit
capabilities
Reliability: Network designs must consider the criticality of systems and devices affected
by the network design and provide redundancy, where appropriate, to reduce the likelihood
of a single point of failure
Segregation of Duties:
o When it is not possible for Veracode to assign duties to separate individuals, the
role performed will be clearly defined, associated activities logged, security-related
functions audited, and compensating controls identified and implemented.
To the extent possible, Veracode must separate the development, test, and production
environments to reduce the risk of unauthorized access or adverse changes to the
production environment
User, Service, and System Segregation: To the extent practical, Veracode must segregate
groups of users, services, and systems on networks
Network Access Points: The number of network access points must be kept to a minimum and
each network access point must have appropriate safeguards to restrict access to authorized users
and the capability to monitor access and usage of the access point
Network Connection Controls: Veracode must restrict the capability of users to connect to the
network in accordance with the access control policy and business requirements
Network Routing Controls: Veracode will implement network segmentation and associated
routing controls to ensure that computer connections and information flows comply with applicable
access control requirements
Network Services:
Veracode will disable or otherwise restrict unnecessary network and host services
including, for example, telnet, ftp, and http
Technical staff will maintain a list of required and authorized services that Management will
regularly review to ensure its continued appropriateness.
Network Equipment Identification: Whenever practical, Veracode will use automated equipment
identification as a means to provide supplemental authentication of connections from specific
locations and equipment
Remote Diagnostic and Port Configuration Protection: Veracode must restrict physical and
logical access to diagnostic and configuration ports to authorized employees, contractors, and third
parties
All change requests must be processed in accordance with Corporate and/or Production
change management procedures
Prior to making any changes affecting the security of systems or devices assigned to PP1
or PP2, Veracode must evaluate the security risks associated with the change and take
appropriate risk management actions
Where appropriate, acceptance criteria will be developed, and suitable tests of the
system(s) carried out during development and prior to acceptance
The procurement of network components will consider using only proven or tested
products and ensuring key network components can be readily replaced
Technical staff must use the Ticketing System to manage and monitor network changes in
accordance with guidance provided by the Chief Information Officer / Chief Information Security
Officer.
The Chief Information Officer / Chief Information Security Officer will ensure that requested
changes are properly evaluated to determine their effect on network security and performance.
Assess risk level associated with the requested change and handle in accordance with
guidelines
If applicable, perform functional and security testing activities commensurate with the
sensitivity & criticality of affected systems.
In such cases, the Veracode Manager must document and forward the circumstances surrounding
the emergency fix to the appropriate email and must introduce the patch into the standard patch
management process as soon as practical so that, if required, Veracode can conduct appropriately
rigorous testing and evaluation of the patch.
Technical staff must use the Ticketing System to manage and monitor network changes in
accordance with guidance provided by the Chief Information Officer / Chief Information Security
Officer
The Chief Information Officer / Chief Information Security Officer will ensure that requested
changes are properly evaluated to determine their effect on network security and confidentiality and
performance
Assess risk level associated with the requested change and handle in accordance with
guidelines
If applicable, perform functional and security testing activities commensurate with the sensitivity &
criticality of affected systems
Notification of change must be communicated at least one (1) hour prior to change.
To the extent possible, Veracode uses dedicated and centrally monitored and managed servers to
collect, aggregate, and analyze security-relevant network logs, preferably using automated means.
Data Collection
Event Log or IDS Record Content
Type of event
Veracode employees must handle event logs and IDS records as Veracode Sensitive information
in accordance with Information Classification and Handling section
Veracode must restrict access to online logs to only specifically authorized individuals
Veracode must retain off-line storage of logs and network trace logs in accordance with Veracode
data retention practices
To the extent possible, Veracode will employ mechanisms so that systems are not halted when
logs become full and that logging continues without disruption
Veracode technical staff must implement controls to protect logs against unauthorized changes
such as disabling the logging function, inadvertent modification or deletion of records, unauthorized
access to removable media containing security-related logs and records
Whenever possible, Veracode must segregate the duties associated with individuals administering
the access controls, performing the log collection and analysis, and performing incident response
NIDS Configuration
Signatures and attack characteristics used by NIDS to detect unauthorized activity must be
regularly updated.
Technical staff will configure the NIDS to provide an alert concerning suspicious activity to a
designated point(s) of contact.
Designated technical staff will document IDS configuration settings and will assist, as necessary, to
periodically review those configurations to ensure that unauthorized or undocumented changes
have not occurred.
PP1: Real-time alerting, whenever possible, otherwise daily analysis of key logs/records
PP2: Real-time alerting, whenever possible, otherwise weekly analysis of key log/records
When logs, event records, or NIDS indicate suspicious activity, Incident and Emergency
Management procedures will be promptly initiated.
Each Veracode employee is responsible to ensure that they abide by all corporate policies and that
the remote information asset is used only for approved business purposes. The Veracode
employee bears responsibility for the consequences should remote access be misused. The
following must be adhered to:
Secure remote access must be strictly controlled. Control will be enforced via one-time
password authentication or public/private keys with strong pass-phrases. For information
on creating a strong pass-phrase see the Password Policy
At no time should any Veracode employee provide their login or email password to anyone,
not even family members
Veracode employees and contractors with remote access privileges must ensure that their
Veracode-owned workstation remains secure, free of malware and remains in compliance
with all applicable corporate policies
Veracode employees and contractors must not use non-Veracode email accounts (i.e.,
Gmail, Hotmail, Yahoo, AOL), or other external resources to conduct Veracode business.
Veracode employees may not use automated means to copy or forward internal Veracode
business email from their corporate Veracode mail account to any external mail systems
All hosts that are connected to Veracode internal networks via remote access technologies
must use the most up-to-date anti-virus software this includes personal computers
purchased and authorized by Veracode for business use. Third party connections must
comply with requirements as stated in the Third Party Agreement
Access Control
ACCESS CONTROL POLICY
Veracode defines access control objectives to manage access to information; prevent unauthorized
access to information systems; ensure the protection of networked services; prevent unauthorized
computer access; detect unauthorized activities; and ensure information security when mobile
computing network facilities are used. This section provides standards that are required to comply
with Veracode’s Access Control objectives.
The IAR system captures information about the person making the request, the person for whom
access is being requested or modified, and the resources to which the individual will be granted
access. The Veracode resource owner approves each IAR and then the designated security
administrator for the system processes the request. Any Veracode employee may submit an IAR,
but the resource owner or their designee must approve it.
User access will be reviewed at least every six (6) months, but may be reviewed more frequently at
the company’s discretion. Individual user access will be reviewed upon transfers, terminations or
other changes in role or function of Veracode employees, contractors or other third parties.
Data/Resource Ownership and Access to Information Assets
All corporate data must be owned and is identified in the IAR as a resource. A resource is defined
as a collection of data, a set of directories, or an application used in Veracode daily operations.
Primary
Secondary
Temporary
Primary data owners are those company employees who are responsible for maintaining the data
on a day-to-day basis and are responsible for granting or denying access to the data resources
under his/her control. Since access to Veracode’s information assets is granted only on a “need to
know” basis, it is the responsibility of the primary data owner to determine if the requesting party
has a legitimate need to access the particular information asset.
Secondary data owners take control of the data assets in the event that the primary data owner is
incapable of performing this duty. Examples would include the transfer, termination or a change in
responsibilities of the primary data owner.
Temporary data owners take control of data assets in the absence of both primary and secondary
data owners. As the name states, the temporary data owner possesses control over the data
assets for only short periods of time. An example would be a “red scenario” during a business
continuity event. For the period of time it takes for regular company employees to report to work
and take control, a temporary data owner may fill in.
Only Veracode full time employees are permitted to be resource owners. Non Veracode
employees are authorized to be temporary data owners only under extreme circumstances, as
evidenced above. Temporary data owners are never allowed to grant new user access to
Veracode’s information assets nor are they permitted to change data classification.
Resource owners are responsible for investigating and understanding what is contained in the
resources they own. Resource owners will act as protectors of corporate data and must carefully
review all access that is requested prior to approval.
Resource owners will be responsible for understanding all newly created data within the owned
resource.
When resource ownership changes, the manager or current resource owner will notify Information
Security by submitting an IAR with the ownership change information.
Multiple Access
A multiple access request is a request for one or more users to have access to one or more system
or application resources. During the course of business it may be necessary to request an IAR for
various individuals at the same time. This standard deals with that eventuality.
One IAR can be submitted for a multiple user request only when identical access is being
requested for all of the individuals.
If an individual requires access to multiple servers from the same user ID with the same privileges,
the additional servers may be requested through the same IAR.
User ID Management
Each Veracode employee, contractor or third-party is assigned a unique user ID which is used in
conjunction with a password to access Veracode’s information assets.
A personal user ID is the responsibility of the individual and must not be shared with anyone.
Group, generic, or temporary user IDs are the responsibility of the owner or custodian of the
information asset and must be terminated when they are no longer required.
User IDs are permanent and remain tied to a particular employee, contractor or third-party for the
length of service of the individual and are stored in the IAR and user provisioning system. Only
under extreme circumstances can a user ID be changed while the individual continues to perform
services for the company. Maintaining unique user IDs allows for continuity in audit logs.
User IDs are created in such a manner that they do not reveal the access level assigned to the
user (e.g., Admin, Tester, etc.).
Absolutely no logins are allowed to Veracode’s information system without a valid password
Users are required to change their passwords every 90 days (passwords to production systems
may require changing more often).
Passwords for user accounts must be both easy to remember as well as difficult to guess. Users
should think in terms of “pass phrases” instead of “passwords”. Password creation must follow the
following Veracode standards:
passwords must not be words that appear in English or foreign language dictionaries;
passwords may not be the same as the user ID;
passwords must be a minimum of eight (8) characters in length;
passwords must contain a mix of at least two (2) of: upper case letters, lower case letters,
numbers and special characters.
Business owners of applications that are used by external customers to access Veracode’s
information assets or business applications must obtain written acceptance (i.e., third-party
contracts, electronic acceptance forms, digital signatures, etc.) from the external customer for any
risks associated with the use of passwords that do not comply with Veracode’s policy.
All passwords required for access to Veracode’s information assets are stored on a central server
either encrypted (using strong encryption) or hashed (using a strong, one-way hash function).
Smart Phones
All Veracode smart phone users are required to password protect their devices. Passwords must
conform to the guidelines outlined in the section above.
System accounts and system utilities must have passwords of at least eight (8) characters
in length
System IDs, system utilities and system accounts must have passwords that expire every
ninety (90) days
All system IDs and accounts must be requested using the IAR system and must be
approved by the appropriate resource owner as well as upper level Management
Once the IAR request has been approved and confirmed, the system ID and account
owner will be provided with a unique system ID and account and password
All system IDs and account passwords must have an associated expiration date. Any
exception to this standard must be justified in writing to the information asset owner
System IDs and accounts must not be shared unless other compensating controls are in
place
The business process owners are responsible for maintaining the security of their system
IDs and accounts All activity that occurs using these IDs and accounts is the sole charge of
the process owner
System IDs and accounts will be issued and authorized by their respective Divisions
After a maximum of five unsuccessful login attempts, the system IDs and accounts will be
locked
Only the authorized user may have access to the system ID and account. A user is
authorized to use a system ID and account if he or she is approved by the owner of the
system ID or the account holder
A system ID and account holder will not authorize or allow the use of the system ID or
account by any other person unless such use has been documented through appropriate
control channels
The user of a system ID or account must not circumvent the security mechanisms of any
computer system or application.
The System Administrator may decide to disable or remove a system ID or account if any of the
following events occurs:
the account holder ceases to have an association with the area or group (due to a transfer
or termination of employment);
When an employee, contractor or third-party suspects that a system ID and account password has
been compromised, they must notify the owner of the effected system, change the password if
possible, and must report all details of the suspected breach to the ISAT.
System ID and account passwords are not to be stored in clear text or stored in an insecure
location. Storage of passwords must adhere to Veracode standards.
Common Requirements
General Requirements
System Design & Build
Security Testing & Quality Assurance
Responsibilities
Veracode distributes responsibility for managing the design, acquisition or build, test, migration,
management, and retirement of systems based on the environment involved.
Veracode Corporate Network: Management and oversight of corporate networked systems, both
corporate as well as hosted service providers, resides with Veracode’s Chief Information Officer /
Chief Information Security Officer.
GENERAL REQUIREMENTS
Veracode employees must consider information security and confidentiality requirements when
planning or designing new or modified systems to ensure the operational system incorporates
sound design principles and appropriate security functionality.
Planning Considerations
Consider the legal, regulatory, and business requirements related to the system or application
design.
Consider the type, function, configuration, assigned protection profile, required safeguards, and
range of security controls available for the system or application:
Technical controls
Management and oversight mechanisms
Supporting processes and procedures
Consider the sensitivity and criticality of systems, devices, and services affected by the system or
application considering how individual security controls (manual and automated) work together to
produce an integrated system of controls.
Consider whether supplemental training and communication is required for users, technicians,
administrators, or managers in connection with the network design.
Provide ‘defense in depth’ to eliminate single points of failure and reduce the likelihood of
compromise.
Ensure all default passwords are changed prior to installation including network, server,
application and database technologies.
Ensure that key components ‘fail securely’ — that is, when an application fails it does not disclose
any information that would not be disclosed ordinarily, and that non-public information and system
files remain protected from unauthorized access or modification.
Employ the principle of ‘least privilege’ at the system, application, and user levels
Applications do not run with high-level privileges (for example, ‘root’ in UNIX systems or
‘Administrator’ in Windows systems)
Employ role-based access control (RBAC) at the user level
Use a consistent, defined process to design, acquire, build, test, manage, and retire information
systems
System- or Application-Specific
Identify specific security and confidentiality controls required by particular business processes
supported by the system or application (for example, access controls, encryption, connectivity, and
logging or monitoring)
Within the system or application as well as the integrated system of controls available within the
networked environment
Controls provided within policies and operating procedures as well as technical controls
Specify a system architecture that can support the business and technical requirements
Identify the set of controls and requirements applicable to the system or application (placement,
function, source)
Identify and document security and confidentiality controls that do not fully meet requirements
If necessary, obtain appropriate approval to accept the residual risks associated with the system or
application architecture
Conduct a formal design review to ensure that security and confidentiality requirements are
properly addressed before coding or acquisition work begins for particularly critical, sensitive, or
complex systems
Unique user ID
Contingency plans
Security Controls Associated with System Recovery Software and Utilities
Veracode will maintain a copy of installation software and system images in a secure offsite
location. Veracode employees must not use these copies for ordinary business activities and will
reserve them for recovery from computer virus infections, hard disk crashes, and similar system
corruption or failures.
General
In addition to using the vendor’s recommended secure configuration, Veracode must also consider
the following security-relevant aspects of the application when evaluating or selecting controls.
Information input controls including the use of range checks, mandatory key fields, or control
balances.
Automated process controls including record hashes/counts, and session, batch or balancing
totals.
Information output controls including reconciliation of control counts to ensure all data is processed,
using plausibility checks to ensure output is reasonable, or restriction of output to specific systems
or devices.
Controls to ensure the completeness, accuracy, and validity of information including file integrity
utilities and comparing record contents before and after changes.
Controls to prevent information leakage (for example, within application responses or error
messages).
System Services
Veracode will disable or otherwise restrict unnecessary network, system, and application services
including, for example, telnet, ftp, and http.
Technical staff will maintain a list of required and authorized services that Management will
regularly review to ensure its continued appropriateness.
Special Considerations for Web-enabled Applications
To help address the increased risks associated with the development and operation of web-
enabled applications, Veracode employees must consider the use of the supplemental controls
outlined below.
Web Server Controls
Run on dedicated systems located in a 'Demilitarized Zone' (DMZ), meaning a logical location that
is protected by firewalls and isolated from both external and internal networks.
Configured with all unnecessary software, network services, and applications removed or disabled.
Configured to prevent web servers from initiating network connections to the Internet.
Configured to perform input validation at the server rather than just the client application.
Configured to log activity on the web site including actions performed by server-side executables
and scripts, such as Common Gateway Interface (CGI) scripts.
Connections between web servers and back-office systems are be restricted to connections
initiated by the web server denying egress access to any connection attempts by corporate
computer assets
Use encryption to protect sensitive data against disclosure in transit (for example, TLS or HTTPS)
Use Session IDs that are difficult to predict to help protect against session cloning or high-jacking
(for example, by configuring the security parameters in cookies used to hold session information or
including a random element)
Updated by specific individuals and using approved methods (for example, using a CD at the web
server console or using secure SSH from a pre-defined IP address or from specified users)
Monitored by automated as well as manual processes, web content is checked regularly to ensure
accuracy, integrity and completeness. Furthermore, Veracode runs testing software against its
own website to discover and remediate any vulnerabilities
Systems must display a notice warning ('log-on banner'), before access is granted, that systems
may only be accessed by authorized users, and that unauthorized access might be considered a
criminal act in certain jurisdictions
Information Leakage
Suppress the server field in HTTP headers that identify the web server's brand and version
Ensure that the source code of server-side executables and scripts cannot be viewed by a browser
(for example, Common Gateway Interface (CGI) scripts)
Ensure that the source of HTML, JavaScript and other client-side scripting languages does not
contain unnecessary information (for example, details of web CGI functions)
Build Process
Considers risk of incompatibility with updated versions of the base software package
Veracode developers should document system build procedures and activities using
standard documentation and revision controls typically used during application
development efforts (for example, documented business requirements, system description,
design specifications, change controls, and code revision controls)
If warranted based on the sensitivity and criticality of the system under development, the
system build activities may be inspected to identify unauthorized modifications or changes
which may compromise security and confidentiality controls; to ensure that individual
components of the system function as intended (for example, by reviewing and testing
program code); and, to confirm that security weaknesses have not been introduced (for
example as a result of package customization)
The system owner, environment owner, and the QA staff will jointly determine whether, and
to what extent, system build activities will be inspected.
System Acquisition
In addition to the general requirements and controls outlined above, Veracode employees must
consider security and confidentiality aspects unique to system acquisition to ensure that hardware
and software acquired from third parties is sufficiently robust, properly licensed, and provides the
required functionality.
Selection of Hardware/Software
Select from approved suppliers
Identify known security deficiencies and consider alternative methods of providing required level of
security
Maintain proof of ownership or right-to-use (for example, through the use of ‘blanket’ license
agreements or retention of master disks/manuals)
Testing Process
Well-planned and correctly executed security testing is a fundamental element of sound systems
development practices. Security testing helps to provide assurance that systems, including
security controls, function as intended.
Such testing should assess the design and build of the system including general security and
confidentiality controls as well as application-specific controls.
While the depth and breadth of testing activities should be commensurate with the sensitivity &
criticality of the system, testing activities generally fall into one of four broad categories:
Functional Testing: Testing primarily focused on exercising the logical functions of the system or
application that may or may not involve security-related capabilities
Security Code Review: A security review focused on identifying insecure coding techniques and
vulnerabilities that could lead to security issues including insecure coding and implementations of
file access permissions, libraries, system calls, logging, etc.
Regardless of the nature of the specific test, leverage automated tools whenever possible to
improve the testing process (for example, to check the validity of system interfaces or simulate
loading from multiple clients).
Test Standards
Veracode employees must execute testing using industry standards of good practice and, where
appropriate, documented testing standards that address:
Use of test plans that identify key components of the testing process cross-referenced to the
system design or specification and, if applicable, include user involvement
Test Parameters
Veracode technical and QA staff must establish parameters that provide sufficient detail to ensure
that testing activities cover the appropriate range of controls for the system or application including:
Vulnerability to attack
Error situations
Interfaces with other systems (for example, program calls and hyperlink references)
Compatibility with the range of possible system configurations that will interact with the system or
application including different operating systems, web browsers, and third-party software
System performance when handling planned volumes of working (that is, load testing with realistic
numbers of users/volumes of transactions)
Test Results
Provide documentation describing the test activities, results, and any gaps noted between actual
and expected results to the development, QA, and Management staff responsible for the
system/application development initiative.
Acceptance Testing
Critical and essential systems will undergo acceptance testing in an isolated area that simulates
the live environment to ensure that only systems that have been appropriately tested and
determined to satisfy both security and user requirements. While QA will determine specific test
parameters and acceptance criteria, acceptance testing should generally include the following
whenever possible:
Involve running the full suite of system components, including application functionality,
database management utilities and the underlying operating system
Feature full integration testing, to ensure there will be no adverse effects on existing
systems
Include attempts to breach the security of the system, for example by performing
penetration tests.
Veracode must protect business and personal information copied from the production environment
for the purposes of conducting acceptance tests using appropriate techniques including:
Requiring separate authorization each time business information is copied from the
production environment into the testing environment
Accordingly, this section covers general requirements for introducing new or changed systems into
the corporate environment, managing system and application patches, managing system
configurations including the use of security-related software and utilities, managing information
backups, and finally, retiring systems in an orderly and secure fashion.
Regardless of the specific activity, Veracode employees must incorporate appropriate management
approvals and, whenever possible, enforce segregation of duties (for example, the separation of
responsibilities between developers, QA, and technical operations staff or the need to separate the
responsibilities of the requestor-implementer and the tester-approver).
System Configuration Change Control
Change management controls ensure that modifications to control options or major security file
changes are properly communicated, planned, coordinated, tested, and implemented. The goal is
to successfully implement changes to correct problems, or to introduce new process improvements
or interfaces without causing disruption to critical system or business production processes.
indicate what will be done prior to, during, and after the change;
Include all instructions for testing and implementation such that another reasonably
qualified security administrator could complete the change, if necessary. The testing
portion should detail activities that will demonstrate the successful completion of functional
and business tests;
Detail the business impact of the change and list the customers, internal or otherwise, who
should be notified of the change.
Submit requests to change system configurations for approval to the appropriate email.
Technical staff must use the Ticketing System to manage and monitor system changes in
accordance with guidance provided by the Chief Information Officer./ Chief Information Security
Officer
The authority to determine system promotion criteria and to approve the release-to-production of a
new or changed system or application within the corporate environment rests with Veracode’s
Chief Information Officer / Chief Information Security Officer or their designated representative(s)
Veracode technical staff must install systems and applications using the approved configurations
and installation procedures
In the event of significant difficulties or failures during the installation process, Veracode’s Chief
Information Officer / Chief Information Security Officer or their designated representative must
conduct a post-implementation review to determine the circumstances surrounding the difficulties
or failure and changes necessary to avoid similar installation problems in the future
Veracode technical staff must promptly adjust asset inventories to reflect the addition of or, if
applicable, change to the system
Emergency Fixes
Designated Veracode technical staff may approve the installation of emergency fixes/patches
without necessarily undergoing requisite testing or obtaining appropriate management approvals
when time-critical installation of the patch/fix is necessary to prevent key system outages or
compromise of non-public information.
In such cases, the Manager must document and forward the circumstances surrounding the
emergency fix to the appropriate email and must introduce the patch into the standard patch
management process as soon as practical so that, if required, Veracode can conduct appropriately
rigorous testing and evaluation of the patch.
Malicious Software (Malware)
Malicious software (malware) is introduced into a corporate network for the purpose of altering,
destroying or stealing information assets. Malicious software currently includes items such as
viruses, Trojan horses, trap doors, keystroke loggers, root kits, worms, as well as others.
Veracode technical staff will implement all measures technically possible to detect and prevent
malware from entering Veracode’s protected networking environment.
Veracode technical staff will regularly monitor vendor bulletins, security forums, and similar
information sources for relevant information concerning virus outbreaks and similar issues related
to malicious software.
Veracode uses a combination of anti-malware software products along with prudent configuration
of networked systems to control the introduction of malware into the Veracode network.
All computers owned by Veracode but residing off company premises must have installed, and
must maintain current updates, for anti-malware software. Access to Veracode’s trusted network
resources depends on keeping this software updated.
All storage media obtained from sources external to Veracode, or previously used with external
systems, must be scanned for malware prior to use in the Veracode environment.
Veracode updates its anti-malware signature files at least weekly, but may update more frequently
should threats warrant it.
Veracode scans for malware at all firewalls, servers, mail servers, intranet servers, workstations,
laptops, and other information systems.
Veracode employees, contractors or third parties who have access to Veracode’s production,
development, or testing environments, must immediately report any detected malware.
Should the ISAT determine that the infection warrants, the employee, contractor or third-party may
be directed to isolate the effected machine from Veracode’s network.
Treatment, disinfection or re-imaging of the effected machine is at the sole discretion of the ISAT,
with input and advice from appropriate Management personnel.
Malware elimination will be accomplished in a way that minimizes impact to Veracode’s assets
while also limiting system downtime.
Security Event Monitoring
General
For key systems, Veracode will provide ongoing intrusion detection functionality through a
combination of collection and analysis of system logs and application audit records, the use of file
integrity utilities to detect unauthorized changes to systems and files, and when appropriate and
specifically approved, the use of host intrusion detection systems (HIDS).
To the extent possible, dedicated and centrally monitored and managed servers will be used to
collect, aggregate, and analyze security-relevant network logs, preferably using automated means.
Type of event
Veracode employees must handle event and system logs as Veracode Sensitive
information in accordance with the Information Classification and Handling section
Veracode must restrict access to online logs to only specifically authorized individuals
Veracode must retain off-line storage of logs and network trace logs in accordance with
Veracode data retention practices
To the extent possible, Veracode will employ mechanisms so that systems are not halted
when logs become full and that logging continues without disruption
Veracode technical staff must implement controls to protect logs against unauthorized
changes such as disabling the logging function, inadvertent modification or deletion of
records, unauthorized access to removable media containing security-related logs and
records
Whenever possible, Veracode must segregate the duties associated with individuals
administering the access controls, performing the log collection and analysis, and
performing incident response
Designated Veracode technical staff must review and analyze alerts and security-relevant logs
based on the following schedule:
PP1: Real-time alerting, whenever possible, otherwise daily analysis of key logs/records
PP2: Real-time alerting, whenever possible, otherwise weekly analysis of key log/records
(except firewall logs which must be reviewed daily)
When logs, event records, or other intrusion detection capabilities indicate suspicious activity,
Incident and Emergency Management procedures will be promptly initiated in accordance with
Incident and Emergency Management procedures.
Data Breach
Many states and the District of Columbia have legislation regarding data breaches. Veracode will
comply to the best of its ability with these state laws, but in the event of conflicting legislation (and
lacking superseding federal legislation) Veracode must give precedence to the laws in the state in
which the corporation was incorporated (Massachusetts).
When a notification is made that data has been potentially disclosed inappropriately, the manager
receiving the notification must contact Veracode’s ISAT. At its sole discretion, the ISAT will
determine if the incident necessitates being escalated to the ISOC who will then meet and choose
appropriate action. Of utmost importance during the time of a data breach will be notifying
appropriate authorities and any affected customers (external users) as well as maintaining
sufficient forensic evidence for possible future legal action.
Keeping an accurate record of Veracode’s business activities is paramount and therefore backups
are made, checked and retained. Veracode’s employees, contractors and third-party vendors must
adhere to the corporate standards outlined in this section:
Backups are performed on information assets currently defined as: production databases,
production servers and corporate business assets
Backups of database customer metadata are performed incrementally throughout the day
and encrypted with 128-bit AES before being transmitted to off-site storage daily
Accuracy of the backup is verified at the end of the backup process and before the backup media is
prepared for storage or transmitted off-site.
The backup media are retained at the secure storage facility for a minimum period of one (1) year
but end of year archives are retained indefinitely.
Version Control
Version control is a means to identify and manage configuration items as they change over time,
usually provided by a software tool designed for configuration management. Project artifacts, such
as source code and documentation, are checked into the Change Management (CM) Version tool
to be stored until future use. Version control activities cover the entire life cycle, from initiation to
retirement of the application.
All configuration items must be identified in the CM Tool and placed under version control in a CM
approved version control tool. This includes all source code, architecture, and design documents,
requirements, build, test, and deploy scripts, and other artifacts that may be identified by the SDLC
methodology.
Commercial off-the-shelf (COTS) product binaries and executables are maintained in a Veracode
approved archive location.
All production builds and deployments must be from an established baseline in a CM approved
system or via a build promotion through the test environment.
At a minimum, there must be a baseline for applications created at the milestones specified in the
Configuration Management Plan.
All changes shall have an assigned impact level of routine (operational low), minor (low), moderate
(medium), or major (high).
Non-routine and non-emergency production changes must be scheduled during designated Low
Impact periods. Non-routine and non-emergency implementations scheduled outside the
designated release periods require waiver approvals from Change Management.
All Moderate and Major Impact infrastructure and application changes must be represented to
ISAT.
Auditing must be enabled on all Veracode computers, servers and network hardware. Contracted
third parties and hosted solution providers must also abide by this corporate standard.
Security audit logs must be retained according to applicable legal and regulatory requirements, but
or for a minimum of one (1) month.
Information Security will maintain an active incident response plan and test this plan at least once
per year or as changes in the plan may necessitate.
Threat and vulnerability information from internal and external sources will reviewed and analyzed
to maintain awareness of active threats and vulnerabilities to information processing assets and
known industry-identified security threats.
System Retirement
This procedure applies to all employees of the Corporation, which includes full-time and part-time
Veracode employees, contract workers, third parties as well as any individual using Veracode’s
corporate information assets.
The procedure pertains to all PC Technology (e.g., personal computer equipment, attached
peripheral devices and software) that were purchased or authorized by Veracode for business use.
Veracode technical staff must appropriately securely delete all information resident on storage
media and hardware prior to releasing it from Veracode/Hosting provider control using approved
overwrite, degaussing, or destruction methods.
Veracode technical staff must promptly adjust asset inventories to reflect the retirement of the
system.
A project, system, or account level Change Implementation Plan is required for all development
and maintenance activities.
Ensure that major patches of key components undergo appropriate testing and evaluation in a test
environment.
Ensure that application of patches on systems in the production infrastructure environment are
approved at appropriate management levels.
Release to Production
The authority to determine system promotion criteria and to approve the release-to-production of a
new or changed system or application within the production infrastructure environment rests with
Veracode’s Chief Information Officer / Chief Information Security Officer or their designated
representative(s).
Veracode technical staff must install systems and applications using tested and approved
configurations and installation procedures.
Veracode technical staff must promptly adjust asset inventories to reflect the addition of or, if
applicable, change to the system.
Emergency Fixes
Veracode’s Chief Information Officer / Chief Information Security Officer is delegated authority to
approve the installation of emergency fixes/patches without necessarily undergoing requisite
testing or obtaining appropriate management approvals when time-critical installation of the
patch/fix is necessary to prevent key system outages or compromise of non-public information.
Such cases must be documented (including the circumstances surrounding the emergency fix) and
forwarded to the appropriate email. The patch must be introduced into the standard patch
management process as soon as practical so that, if required, Veracode can conduct appropriately
rigorous testing and evaluation of the patch.
Computer viruses, worms, and other malicious programs represent a unique threat to the overall
integrity of Veracode information assets. Computer viruses can be particularly difficult to detect or
protect against using conventional security equipment such as firewalls and intrusion detection and
specialized measures are necessary to help counter the threat posed by computer viruses and
other malicious payload content.
Veracode technical staff will implement appropriate measures to prevent, detect, and recover from
the introduction of malicious logic into the Veracode environment. Where systems and applications
use mobile code, the configuration of those systems and applications must ensure that the
authorized mobile code operates according to clearly defined security parameters, and prevents
execution of unauthorized mobile code.
Veracode technical staff will regularly monitor vendor bulletins, security forums, and similar
information sources for relevant information concerning virus outbreaks and similar issues related
to malicious software.
Veracode technical staff will use a combination of anti-virus software installed on workstations and
servers along with prudent configuration of networked systems to control the introduction of
malicious logic and mobile code in the production infrastructure environment.
All storage media obtained from sources other than Veracode or Hosting provider, or previously
used with external systems, must be scanned for viruses prior to (re-)use in the production
infrastructure environment.
Veracode technical staff must ensure that anti-virus software and signature files are updated at
least weekly, or more frequently if the threat warrants.
Veracode technical staff will implement scans for malicious logic on all servers within the
production infrastructure environment.
Veracode technical staff will, to the extent possible, perform anti-virus scanning in real-time or in a
timely manner consistent with the threat.
Hosting provider and Veracode technical staff must promptly report any viruses detected in the
production infrastructure environment to their ISAT point of contact.
Veracode technical staff must disconnect any systems suspected of being infected from the
production infrastructure environment.
Veracode technical staff must not use electronic storage media used with the infected computer on
any other computer until the virus has been eradicated.
Veracode technical staff will accomplish virus eradication in a manner that minimizes both data
destruction and system downtime.
Designated technical staff must regularly review and analyze alerts and security-relevant logs using
real-time alerting, whenever possible, otherwise daily analysis of key logs/records.
When logs, event records, or other intrusion detection capabilities indicate suspicious activity,
Hosting provider and Veracode technical staff must appropriately escalate the situation to
designated Veracode staff in accordance with Hosting provider’s document procedure entitled
“Problem Management Process” and other applicable agreements between the two companies.
Veracode staff will initiative appropriate response protocols in accordance with Incident and
Emergency Management procedures.
Information Backup
Keeping an accurate record of Veracode’s business activities is paramount and therefore backups
are made, checked and retained. Veracode’s employees, contractors and third-party vendors must
adhere to the corporate standards outlined in this section.
Veracode performs backups of the production and corporate systems on a daily basis. As part of
the server build process, backup software is installed on production servers, unless the server is
exempt as determined by Management. The following system components are included within the
backup process:
• Production Servers
The backups of the components above are encrypted to prevent anyone without authorized access
to the encryption keys from being able to access the content of the backups. Veracode receives
and reviews a daily status report, highlighting the status of each backup.
Any backup failures would be documented and escalated to the incident management process.
Upon determining that all daily backup jobs were successful, backup media is encrypted and
transmitted to an offsite 3rd party. The backup media is retained offsite for a minimum period of
one (1) year.
Access to request and make changes to the backup schedules is restricted to authorized and
appropriate personnel. Any changes to the schedule would follow the Change Management
process, as described above.
System Retirement
Veracode technical staff must appropriately securely delete information resident on media and
hardware prior to releasing it from Veracode/Hosting provider control using approved overwrite,
degaussing, or destruction methods.
Veracode technical staff must promptly adjust asset inventories to reflect the retirement of the
system.
Change Control, Standards and Policy Compliance
Testing functions must be performed by different individuals or groups other than those who
completed the development functions.
Individuals who deploy development code must not have write access to the source code.
Only the individual designated to deploy development code may execute that deployment,
migration, or implementation.
Any exceptions must be approved by management/ISAT, documented, and recorded in the email
archive.
All application and infrastructure changes must be reviewed by ISAT to verify compliance security
and confidentiality policies, standards, and procedures.
Requests for exceptions to the Security Auditing Standards must be submitted to the ISOC for
approval.
Technical Monitoring
Log Aggregation, Protection, and Analysis
System Clock Synchronization
Technical Monitoring
The following requirements apply to technical monitoring of the Veracode environment in addition
to intrusion detection and security event monitoring requirements specified elsewhere in this policy.
Monitoring efforts will focus on particularly sensitive information systems and the actions of
privileged users and administrators.
Veracode employees must handle event and system logs as Veracode Sensitive
information in accordance with Information Classification and Handling
Veracode must restrict access to online logs to only specifically authorized individuals
Veracode must retain off-line storage of logs and network trace logs in accordance with
Veracode data retention practices
To the extent possible, Veracode will employ mechanisms so that systems are not halted
when logs become full and that logging continues without disruption
Veracode technical staff must implement controls to protect logs against unauthorized
changes such as disabling the logging function, inadvertent modification or deletion of
Whenever possible, Veracode must segregate the duties associated with individuals
administering the access controls, performing the log collection and analysis, and
performing incident response.
Event or System Log Analysis and Alerting
Designated Veracode technical staff must review and analyze alerts and security-relevant logs
based on the following schedule:
PP1: Real-time alerting, whenever possible, otherwise daily analysis of key logs/records
PP2: Real-time alerting, whenever possible, otherwise weekly analysis of key log/records
PP3: Log analysis is not specifically mandated
When logs, event records, or other intrusion detection capabilities indicate suspicious activity,
Incident and Emergency Management procedures will be promptly initiated in accordance with
Incident and Emergency Management policy.
Clock Synchronization
To facilitate the accurate reconstruction of events surrounding an actual or potential compromise,
information systems assigned a protection profile of PP1 or PP2 will synchronize their system
clocks using a single, accurate time source.
Technical Vulnerability Management
To reduce risks resulting from exploitation of published technical vulnerabilities, Veracode will
continuously monitor and periodically test for the presence of technical vulnerabilities within the
Veracode environment.
When vulnerabilities applicable to Veracode information systems are noted, technical staff will
evaluate the risk associated with the vulnerability in light of the systems’ usage, configuration, and
the presence of compensating controls in the networked environment. If the vulnerability
represents a moderate- or high-level risk, technical staff must notify ISAT and Chief Information
Officer / Chief Information Security Officer so that Veracode can respond appropriately to address
the vulnerability and oversee corrective actions.
PROTECTION PROFILE
Vulnerability Scanning
Penetration Testing
OVERVIEW
This standard establishes guidelines for effective management and response of information security
incidents including but not limited to, detecting, responding, investigating, monitoring, and logging.
Despite the best controls, no organization can be invulnerable to all security threats. To address this,
a response process will minimize the damage created by a realized event or threat, and help identify
improvements to Veracode’s security posture. The following are benefits of having an incident
response capability:
Helping personnel to recover quickly and efficiently from security incidents, minimizing loss or theft
of information and disruption of services
Using information gained during incident handling to better prepare for handling future incidents
and to provide stronger protection for systems and data
Dealing properly with legal issues that may arise during incidents. Failure to abide by this standard
may result in:
– Financial loss
– Criminal/civil penalties
– Non-compliance with compliance requirements and therefore risk losing certifications (i.e. ISO
27001, FedRAMP)
SCOPE
This standard applies to all regular and temporary employees, contractors, consultants, and other
personnel at Veracode, including all personnel affiliated with third parties who may be subject to one
or more policies or agreements regarding the use of, or access to, the relevant Veracode
environments, including applications, servers, databases, network services, middleware, data centers,
and infrastructure changes that have the potential to impact Veracode business. This standard applies
to all equipment and resources that are owned or leased by Veracode and all service providers
providing service to Veracode.
REVIEW CYCLE
This standard may be reviewed more frequently, but not less, than annually .
STATEMENT OF REQUIREMENTS
Management shall implement systems and processes to ensure information security weaknesses
associated with information processing facilities are communicated in a manner allowing timely
corrective action to be taken.
Management should ensure a consistent, effective, and timely approach is applied to the management
of information security incidents through the assignment of responsibilities and development of
procedures.
Management should learn from incidents to continuously improve the response process and quantify
the types, volume, and costs associated with events and incidents.
Where a follow-up action against a person or organization after an information security event or
incident involves legal action, evidence shall be collected, retained, and presented to conform to the
rules for evidence in relevant jurisdiction(s).
This plan will further detail requirements and procedures for incident management as follows:
An incident response team should be available for contact by anyone who discovers or suspects that
an incident involving Veracode has occurred. Security and Compliance shall make everyone aware of
when and how to report incidents through regular security awareness training.
Requires a high degree of coordination and collaboration with the production infrastructure
Initial discovery of the incident and initiation of response protocols is primarily accomplished
by the Hosting provider Network Operations Center (NOC) and Veracode technical staff
based on criteria specified in the associated service level agreement (SLA) or similar
arrangement and internal Hosting provider/Veracode procedures.
Initial discovery of the incident will likely occur through various and sundry means including
audits, assessments, technical testing, and during the course of routine operations.
Initial incident reporting may be initiated by employees, customers, law enforcement and
security organizations, or by the general public.
Veracode will receive notification of a potential incident by telephone, email, letter, or face-to-
face communication.
Despite these differences, Veracode will manage the incident response process using a common
framework. As such, the direction provided in this policy applies to all incidents unless specifically
stated to the contrary.
Incident Stages
Veracode organizes incident management activities around distinct stages commonly associated with
information security incidents.
Discovery: This stage includes initial actions taken upon notification or realization that an incident has
occurred or may be in progress
Classification: During this stage, the ISAT or other responder(s) gather sufficient information to
classify the incident based on its nature or type, severity of impact, extent of compromise, and
problem persistence
Notification and Escalation: Based on the affected environment and severity level, the ISAT or other
responder(s) will notify specified individuals or entities
Assessment and Investigation: The ISAT coordinates and executes an investigation of the incident
to identify the affected systems, vulnerable information, root cause(s), responsible parties, and the
corrective or compensating actions required to recover from the incident and return to normal
operations
Recovery: Depending on the nature of the incident and the systems affected, designated Veracode
staff will perform specific tasks to recover from the incident in an effective, secure manner
Closure: Identification of “lessons learned” and validation that all corrective actions have been
accomplished
Discovery
This stage includes initial actions taken upon notification or realization that an incident has occurred or
may be in progress. Because Veracode will become aware of incidents in a variety of ways, all
employees must possess a clear understanding of how to recognize and report a potential incident.
Regardless of the source, employees should route all initial event notifications through Veracode’s
Information Security Assessment Team (ISAT). The ISAT will then perform a preliminary analysis of
the incident and will initiate appropriate response actions.
Individuals reporting potential security incidents should use direct or telephonic communication as the
preferred means of notification
If the incident does not involve the corporate email system, Veracode employees may report incidents
through internal email only
Veracode prohibits employees from using external mail systems to report, acknowledge, or discuss
potential incidents
Classification
Veracode classifies incidents based on their nature or type, severity of impact, extent of compromise,
and persistence of the problem or issue resulting in a determination that the incident falls into a
particular type and severity level. This determination is necessary in order to help properly guide the
actions of incident responders and is subject to change during the course of a response since
subsequent investigation may reveal previously unknown information that affects initial conclusions
concerning the nature and severity of the incident. This section defines and describes the general
types of incidents, the levels associated with a system outage or degradation in system performance,
and the (overall) severity levels based on the degree to which the incident can adversely affect
Veracode and our customers.
Incident Types
Incidents will generally fall into one of the following broad categories:
Malicious Software/Code
Physical intrusion
In many cases, the presence of one type of incident may actually be a symptom of the problem rather
than the root cause (for example, the introduction of certain malicious software may well lead to
service degradation, unauthorized information or system access, and the propagation of the code
across other connected systems). Understanding and communicating the primary nature of an
incident will aid Veracode in determining the most effective course of action to take in response.
Severity Levels
Veracode defined four levels to classify incidents involving an outage or degradation of service
affecting systems with an assigned protection profile of PP1 or PP2.
Level 1—Failure or breach in the production operation of Veracode Service causing severe impact
on ability to access the Veracode platform and/or run business critical reports from the Veracode
platform. No Customer-acceptable workaround in place. Problem persists for greater than 60
minutes.
Level 2—Intermittent failure or breach in the production operation of Veracode Service that causes
moderate degradation in performance or functionality, resulting in a major operational impact on
ability to access the Veracode platform and/or run business critical reports from the Veracode
platform. No acceptable workaround in place. Problem persists for between 30 minutes to 60
minutes.
Level 3 —Minor impact in the production operation of Veracode Service where the solution is
operational, but a technical issue exists that may need resolution. This includes issues where an
acceptable workaround is usually available and/or a documentation issue exists. Problem persists
for between 5 and 30 minutes.
Level 4—Low or no impact in the production operation of Veracode Service where the issue(s) do
not impede operations and are limited to user questions and enhancement requests. Problem
persists for less than 5 minutes.
The preferred communications method is in-person or over a landline telephone and avoid using
communications channels when there is reason to believe they were compromised in connection with
the incident
Refer any inquiries from the media or other third parties, without comment, to the Chief Information
Officer / Chief Information Security Officer
RISK LEVEL
SEVERITY OR OUTAGE LEVEL S1/L1 S2/L2 S3/L3 S4/L4 S1/L1 S2/L2 S3/L3 S4/L4
All Employees TBD TBD --- --- TBD --- --- ---
Affected Customers --- --- --- --- TBD TBD --- ---
All Employees TBD TBD --- --- TBD --- --- ---
Affected Customers --- --- --- --- TBD TBD TBD ---
Information Security
* --- --- --- * * --- ---
Oversight Council (ISOC)
Hosting provider will use the associated event handler and event routing rules to determine proper
escalation path and Veracode notification.
Regardless of source, all event notifications will initially be routed through Veracode’s Information
Security Assessment Team (ISAT).
The ISAT or other designated responder will promptly notify the Chief Information Officer / Chief
Information Security Officer of any Severity Level 1,2, or 3 incidents.
The ISAT or other designated responder will immediately notify Executive Management of any
Severity Level 1 incidents.
Veracode Proprietary and Confidential > 2020 Q3 < 90
> INFORMATION SECURITY INCIDENT MANAGEMENT
For incidents requiring authority beyond that of the ISAT (including certain security and confidentiality
related incidents), executive management will be the primary governing body.
The ISAT or other designated responder will immediately notify ISOC of some Severity level 1
incidents that are deemed critical enough in their collective assessment such that immediate
notification of ISOC is warranted. The ISOC may choose to convene an emergency session (upon
request of ISAT or independently) to review incident and status as related to current policy and
operating procedures.
The Chief Information Officer / Chief Information Security Officer is responsible for coordinating
resolution of software issues with the on-call engineer.
The Chief Information Officer / Chief Information Security Officer or designated representative is
responsible for coordinating resolution of infrastructure issues with Hosting provider.
Assessment and Investigation
During this stage, the ISAT takes those actions necessary to contain and investigate the incident to
identify the affected systems, vulnerable information, root cause, responsible parties, and the
corrective or compensating actions required to recover from the incident and return to normal
operations.
Executive Management and the ISAT will use the following considerations to guide their actions in
connection with incident investigations:
Containment: The ISAT will immediately take necessary actions to halt or limit the damage to
systems, or the compromise of non-public information, resulting from the incident
Investigative Priority: Investigative activities for incidents classified as Severity Level 1 or 2 will, to
the extent possible, take priority over other work assigned to the team members
Evidence Preservation: For incidents classified as Severity Level 1 or 2, the ISAT will:
Collect and securely store all logs, records, journals, documentation, and media containing
relevant information
Refrain from taking actions that corrupt or otherwise degrade the value and quality of
information retrievable through cyber forensics
Maintain a journal and associated field notes related to the incident response activities.
Third-Party Involvement: With the approval of appropriate Executive Management, the ISAT will
engage third parties or law enforcement personnel for the purpose of forensic examination, criminal
prosecution, or civil litigation
Additionally, the ISOC will maintain a record containing essential information regarding each incident
classified as Severity Level 1 or 2.
Recovery
Based on the information obtained during the course of the investigation, the ISAT will develop an
incident corrective action plan in connection with incidents classified as Severity Level 1 or 2. The
ISAT will verify that appropriate individuals are aware of and approve the implementation of corrective
or compensating actions required to recover from the incident. The corrective action plan will address
and document all relevant changes including:
Depending on the nature of the incident and the systems affected, and at the direction of the ISAT,
designated Veracode staff will perform specific tasks to recover from the incident in an effective,
secure manner. These individuals will:
Maintain a journal and associated field notes related to the incident recovery activities
Use software from a trusted source to reinstall applications and operating systems.
Objective assessment of each incident - Reviewing logs, forms, reports, and other incident
documentation for adherence to established incident response policies and procedures
Subjective assessment of each incident - Incident response team members may be asked to
assess their own performance, as well as that of other team members and of the entire team.
External Reporting
In the event of an incident that requires reporting to a government agency, the ISOC team will support
the reporting guidelines in the US CERT - Federal Incident Reporting Guidelines for reporting times
(http://www.us-cert.gov/government-users/reporting-requirements.html).
As per Federal Incident Reporting Guidelines, reports of computer incidents will include a description
of the incident or event, using the appropriate taxonomy, and as much of the following information as
possible:
Agency name
Point of contact information including name, telephone, and email address
Incident Category Type (e.g., CAT 1, CAT 2, etc., see table below)
Incident date and time, including time zone
Source IP, Destination IP, port, and protocol
Operating System, including version, patches, etc.
System Function (e.g., DNS/web server, workstation, etc.)
Antivirus software installed, including version, and latest updates
Location of the system(s) involved in the incident (e.g., Washington DC, Los Angeles, CA)
Method used to identify the incident (e.g., IDS, audit log analysis, system administrator)
Impact to agency
Resolution.
CAT 0 Exercise / Network This category is used during Not Applicable; this
Defense Testing state, federal, national, category is for each
international exercises and agency's internal use
approved activity testing of during exercises.
internal/external network
defenses or responses.
Internal Reporting
All Veracode personnel have a responsibility to report events that they believe indicate a security
incident has occurred. Examples of such events include, but are not limited to:
Alerts, notifications, error messages, or other automated warnings that indicate a security
incident may have occurred;
Reports of security incidents received from external parties, including customers,
members of the press, or the general public;
Veracode Proprietary and Confidential > 2020 Q3 < 94
> INFORMATION SECURITY INCIDENT MANAGEMENT
Additionally, the QC test procedure ensure that the ISAT team successfully completes the following
steps:
After each test is performed, there is a thorough review of the process that was followed. The test
results are reviewed to determine what was successful and where mistakes were made. As such,
there are three outcomes for any test performed as follows:
Processes are then identified to be improved and modified accordingly. Veracode documents
the effectiveness of the incident response capability by documenting the results, exercise
outcome, a summary, and recommendations of incident response tests.
Veracode Proprietary and Confidential > 2020 Q3 < 95
> INFORMATION SECURITY INCIDENT MANAGEMENT
Additionally, Veracode’s incident response guidelines and procedures are outlined in the Company’
Information Security Policy (VISP), which all Veracode employees are required to read, sign and
comply with upon employment with Veracode.
ISAT members are required to participate in b-annual incident handling and response tests that are
necessary to fulfill compliance and audit requirements. This provides on job training to perform
incident management activities. Additionally, annual security awareness training that includes
specifics on incident response is provided to all Veracode personnel.
The VOSP has completed the incident response process and determined that enough software
patches and/or workarounds exist to address the vulnerability, or subsequent public disclosure
of code fixes is planned to address high-severity vulnerabilities.
If Veracode has observed active exploitation of a vulnerability that could lead to increased risk
for Veracode customers. For this condition, Veracode will accelerate the publication of a
security announcement describing the vulnerability that may or may not include a complete set
of patches or workarounds.
There is the potential for increased public awareness of a vulnerability affecting Veracode
products that could lead to increased risk for Veracode customers. For this condition, Veracode
will accelerate the publication of a security announcement describing the vulnerability that may
or may not include a complete set of patches or workarounds .
The plans provide for the prompt and effective continuation of all business critical functions and
service offerings in the event of a disruption of service.
Veracode will take all reasonable steps to ensure that in the event of a service interruption,
essential services will be maintained, and normal services restored as soon as possible.
Each department and business function within Veracode generally perform risk assessments and
business impact analyses to determine the criticality of their department and business function, and
document the risk their loss would pose to the company.
Infrastructure
Veracode uses Send Word Now as our critical Incident alerting and messaging system to notify
employees of business interruptions.
Critical elements of the infrastructure supporting the corporate office is located in the Lowell and
Somerville facility. This includes email and messaging systems as well as a VPN for remote
connectivity.
Veracode’s phone system is provided as a service from 8x8 communications and is accessible to
employees anywhere they are located.
Redundant Infrastructure
The Veracode platform has built-in redundancies at each level of its service infrastructure that is
hosted at third party service providers and that includes network, web, application & database tiers.
Veracode protects data required for the Veracode Application Security Platform (VASP) to function,
including system data and infrastructure data.
Backups of customer metadata are performed incrementally throughout the day and encrypted with
128-bit AES before being transmitted to off-site storage daily.
For security reasons customer binaries are not backed up. In the event of a disaster occurring to
the hosting facility, customers will only have to re-upload their binaries for any scans that were in
process.
Equipment to support all tiers of operations are maintained and kept up to date in the alternate
facility. Such an arrangement would be temporary and provide for the restoration of a reduced
scale of service. Full resumption of services can be achieved at the primary facility if available; or
relocated to an alternate processing location when available.
This includes redundant firewalls, switches, load balancers, web servers, application servers,
database servers, engine hosts, and data storage clusters. Operations can be resumed once the
current data is restored from a backup and the external DNS entry is changed to point to the new
location.
Throughout the year the Veracode IT organization undertakes a number of tests and drills to
enhance its preparedness in case of a disaster.
Compliance
THE VERACODE WAY (VERACODE OF CONDUCT)
The Veracode Way is the foundation of our culture. It guides our behavior, decisions and actions
toward our stakeholders; employees, customers, investors and the broader community.
Security is job one
We are trustworthy and uphold a higher standard. Customers trust us with their data. We
preserve that trust.
Help our customers be heroes
We offer solutions and instill confidence to help our customers win. We are the “Monster” in
their corner.
Be transparent, with discretion
We share expectations, priorities and status. We give and solicit honest feedback.
PRIVACY POLICY
Veracode’s Privacy Policy may be reviewed at: https://www.veracode.com/privacy-policy
PRIVACY SHIELD
Organization Information:
Veracode, Inc.
65 Network Drive
Burlington, Massachusetts 01803
Phone: 339-674-2500
Fax: 339-674-2502
www.veracode.com
Organization Contact:
Contact Office: Chief Information Security Officer
Name: Chris Wysopal
Phone: 339-674-2703
Fax: 339-674-2502
Email: [email protected]
Verification: In-house
Agrees to Cooperate and Comply with the EU and/or Swiss Data Protection Authorities? Yes
Industry Sectors:
Computer Services - (CSV)
Computer Software - (CSF)
Information Services - (INF)
Corporate Headquarters
Veracode, Inc.
65 Network Drive
Burlington, Massachusetts 01803 USA
Tel +1.339.674.2500 Fax +1.339.674.2502
Email: [email protected]
EMEA Headquarters
Veracode, Ltd.
36 Queen Street,
London, EC4R 1BN UK
Tel: +44 (0) 203 427 6025
Email: [email protected]
policies and metrics across disparate development teams, no matter where they’re located.
For more information, visit www.veracode.com, follow on Twitter: @Veracode or read the Veracode
Blog at www/veracode.com/blog.
© 2020 Veracode, Inc. All rights reserved. All other brand names, product names, or trademarks
belong to their respective holders.