ngrok.com
Open in
urlscan Pro
35.92.55.128
Public Scan
Submitted URL: https://d2v8tf04.na1.hubspotlinks.com/Ctc/5F+113/d2v8tf04/VWjc-g8w44dCW3FNMzh24xs8vW7Kkhd55fJ-rZN4WpFgP3qn9gW7Y8-PT6lZ3lZW7f9-KM4nc8m4...
Effective URL: https://ngrok.com/security?utm_campaign=may_2024_newsletter&utm_medium=newsletter&_hsenc=p2ANqtz-_CiuyyRX0adYeu8Jx...
Submission: On July 31 via api from BE — Scanned from CA
Effective URL: https://ngrok.com/security?utm_campaign=may_2024_newsletter&utm_medium=newsletter&_hsenc=p2ANqtz-_CiuyyRX0adYeu8Jx...
Submission: On July 31 via api from BE — Scanned from CA
Form analysis
0 forms found in the DOMText Content
YOUR PRIVACY Welcome to ngrok! We’re glad you’re here and want you to know that we respect your privacy and your right to control how we collect, use, and share your personal data. Listed below are the purposes for which we process your data–please indicate whether you consent to such processing. For more information on our privacy practices, including legal bases and our use of tracking technologies like cookies, please read our Privacy Policy. PURPOSES Reject AllAccept All AnalyticsLegal Basis: Consent - Opt In Collection and analysis of personal data to further our business goals; for example, analysis of behavior of website visitors, creation of target lists for marketing and sales, and measurement of advertising performance. Legal Basis Data subject has affirmatively and unambiguously consented to the processing for one or more specific purposes Cookies Behavioral AdvertisingLegal Basis: Consent - Opt In Creation and activation of advertisements based on a profile informed by the collection and analysis of behavioral and personal characteristics; we may set cookies or other trackers for this purpose. Legal Basis Data subject has affirmatively and unambiguously consented to the processing for one or more specific purposes Cookies Essential ServicesLegal Basis: Legitimate Interest - Non-Objectable Collection and processing of personal data to enable functionality that is essential to providing our services, including security activities, debugging, authentication, and fraud prevention, as well as contacting you with information related to products/services you have used or purchased; we may set essential cookies or other trackers for these purposes. Legal Basis Necessary for the purposes of the legitimate interests pursued by the controller or by a third party, except where such interests are overridden by the interests or fundamental rights and freedoms of the data subject Cookies FunctionalLegal Basis: Consent - Opt In Legal Basis Data subject has affirmatively and unambiguously consented to the processing for one or more specific purposes Save choices 🤯 Introducing Traffic Inspector - Observability right from the ngrok dashboard. Learn more -> Platform Use cases ngrok for development Developer Preview Webhook Testing ngrok for production API Gateway Device Gateway Global Load Balancer Identity-Aware Proxy Kubernetes Ingress Site-to-site connectivity More from ngrok Talk to an expert Blog Resources Resources Customers Trusted by the best teams and recommended by category leaders Partners Build what you love with ngrok and our partners Security Security, privacy, and compliance Events & Webinars Visit virtual and in-person events for live learning and discussions Guides Tutorials for common tasks using ngrok Videos Learn how you can use ngrok with your application Docs Docs View all docs Browse our catalog of technical documentation Quick start Put your app on the internet with the ngrok agent in less than a minute API Programmatic access to all of ngrok's resources SDKs Embed ngrok directly into your application Integrations Effortlessly integrate with your favorite software platforms GitHub The home of ngrok's open source software projects that you can use to build on ngrok Pricing Get ngrok Get ngrok Download The fastest way to put anything on the internet Getting started ngrok is easy to install SDKs Embed ngrok directly into your application Contact us Talk to an ngrok expert LoginSign up Log inSign up SECURITY, PRIVACY, AND COMPLIANCE Working with ngrok means working with a vetted, secure solution & seasoned team who understands security TRUSTED BY OVER 5 MILLION DEVELOPERS AND RECOMMENDED BY CATEGORY LEADERS SECURITY AT NGROK The ngrok service is designed, built, maintained, monitored, and regularly updated with security in mind. We use the shared security responsibility model, a framework adopted by many cloud providers — including Amazon AWS, Microsoft, and Salesforce — to identify the distinct security responsibilities of the customer and the cloud provider. In this model: ngrok is responsible for the security of the ngrok service. ngrok is also responsible for providing features you can subscribe to in order to secure your services. Our customers are responsible for securing how they use the ngrok service. This includes, for example, granting the correct permissions to users and administrators, disabling accounts and auth tokens when employees are terminated, properly configuring features required to protect your data, and keeping ngrok agents updated in our systems. HOW NGROK SECURES ITS SOFTWARE DEVELOPMENT PROCESS The ngrok software development lifecycle is designed with precautions to reduce security risks during code development while delivering software functionality. ngrok adopts rigorous processes and automation to ensure consistency across the development. Access control We use an identity provider, which enforces minimum password requirements and multi-factor authentication. We require our vendor applications to have two-factor authentication or use SSO with our identity provider. Our internal applications are part of a zero-trust setup via OAuth and OIDC. We gate access to our codebase using GitHub. Developer credentials are rotated based on a set schedule in an automated fashion. Change management We follow industry standard best practices when it comes to updating and deploying our code. We leverage automated tools to scan our code for a variety of issues, including syntax errors, code style, code quality, CVEs in our container builds, outdated dependencies, and more. Before code is merged to our master branch, we run automated tests against the build for this code change. All code merged to our master branch must also be reviewed by a human being as well through a pull request. We have an automated process for deploying our code changes to production. We leverage Terraform, an infrastructure as code tool, to track changes to our infrastructure. Device management We require developer machines to have full hard disk encryption. Developers are required to use Chrome as their browser. Miscellaneous All vendor products we use go through a security review and are tracked internally with documentation. We have internal security policies that employees are trained to follow. These include: remote access, information logging, acceptable encryption, acceptable use, and web application security policies. HOW NGROK SECURES ITS SERVICE ngrok implements runtime controls at the service level to ensure the confidentiality, integrity, and availability of its service. PHILOSOPHY Our general philosophy for keeping our production environments secure has two main components: defense in depth and principle of least privilege. ACCESS CONTROL We practice 'least privilege' access grants. Engineers get the minimum level of production access they need. Shell access to production machines uses industry best practices of SSH certificate authorities to grant time-limited access in extraneous circumstances.We keep audit logs of all grants to access production machines. Services that manipulate cloud resources are granted least privilege access grants via an associated 'Role' they assume to perform those operations. DATA ENCRYPTION All data is encrypted at rest. This includes databases, host filesystems, network-mounted file systems, and data sent to data warehousing services. All secrets and keys uploaded by users are further encrypted at the application layer with keys that only we control.All internal secrets used by ngrok are stored encrypted at rest with key rotation using industry secret key storage provided by HashiCorp Vault. For API keys, credential tokens, and passwords, we only keep one-way salted hashes of users' credential tokens. RESOURCES RECOMMENDATIONS FOR USING NGROK SECURELY This guide will walk you through recommendations for ensuring you are using ngrok securely. Learn More BEST SECURITY PRACTICES ON DEVELOPER PRODUCTIVITY Learn the best practices to secure developer teams using ngrok while leveraging your company security stack. Learn More NGROK TRUST PORTAL Learn more about ngrok's security controls. Access our compliance certifications and attestations. Learn More NGROK SERVICE STATUS Review ngrok's real-time and historical data on system performance. Learn More PRIVACY As a company, we take customer data privacy seriously, ensuring that: All new vendors, assets and activities pertaining to processing personal data are subject to a review of privacy, security, and compliance. Personal data is properly collected, stored, and documented. Relevant processes are followed for transfers of personal data outside the European Union / UK. For more information, read our privacy policy. DATA SOVEREIGNTY Our customers can use ngrok through our public service or our private offering for complete control of their data and processes. For more information about our private offering, contact our sales team. Contact Sales COMPLIANCE ngrok is SOC 2 Type 2 compliant. The SOC 2 Type 2 attestation certifies that ngrok's security processes and operations are in place and that we follow these processes and operations on a daily basis, meeting AICPA's trust services criteria for security. ngrok provides access to the SOC 2 reports as well as all third party security upon request at the ngrok security and trust portal. Platform Product Cloud Edge Secure Tunnels Platform Features Use Cases ngrok for development ngrok for production Site-to-site connectivity API Gateway Device Gateway Kubernetes Ingress Global Load Balancer Identity-Aware Proxy Webhook Testing Developer Preview View all use cases Resources Security Trust Platform Customers Integrations Blog Support Abuse Get Started Download Pricing Docs Contact Partners Service Status Company About Newsletter Events Press Brand Careers Terms of Service Privacy Policy Privacy Preferences DPA © 2024 ngrok, Inc.