mirror of
https://github.com/zulip/zulip.git
synced 2025-11-02 21:13:36 +00:00
The line number was outdated and was linking to totally unrelated section. I think the best way to handle this case would be to link directly to search.
160 lines
8.3 KiB
Markdown
160 lines
8.3 KiB
Markdown
Zulip’s security strategy covers all aspects of our product and
|
||
business. Making sure your information stays protected is our highest
|
||
priority.
|
||
|
||
## Security basics
|
||
|
||
- All Zulip clients (web, mobile, desktop, terminal, and integrations)
|
||
require TLS encryption and authentication over HTTPS for all data
|
||
transmission between clients and the server, both on LAN and the Internet.
|
||
Encryption-at-rest is available with Zulip on-premise, via hardware and
|
||
software disk encryption of the database and other data storage media.
|
||
- Zulip’s on-premise offerings can be hosted entirely behind your firewall,
|
||
or even on an air-gapped network (disconnected from the Internet).
|
||
- Every Zulip authenticated API endpoint has built in rate limiting to
|
||
prevent DoS attacks.
|
||
- Connections from the Zulip servers to Active Directory/LDAP can be secured
|
||
with TLS. If Zulip is
|
||
[deployed on multiple servers](https://zulip.readthedocs.io/en/latest/production/deployment.html),
|
||
all connections between parts of the Zulip infrastructure can be secured
|
||
with TLS or SSH.
|
||
- Message content can be
|
||
[excluded from mobile push notifications][redact-content],
|
||
to avoid displaying message content on locked mobile screens, and to
|
||
comply with strict compliance policies such as the USA’s HIPAA standards.
|
||
- Zulip operates a HackerOne bug bounty program to reward hackers for
|
||
finding and responsibly reporting security vulnerabilities in Zulip. Our
|
||
[completely open source codebase](https://github.com/zulip/zulip) means
|
||
that HackerOne’s white-hat hackers can audit Zulip for potential security
|
||
issues with full access to the source code.
|
||
|
||
[redact-content]: https://zulip.readthedocs.io/en/latest/production/mobile-push-notifications.html#security-and-privacy
|
||
|
||
## Configurable access control policies
|
||
|
||
- Zulip supports private messages (to one or more individuals), private
|
||
streams with any number of subscribers, as well as public streams
|
||
available to all organization members. We also support guest accounts,
|
||
which only have access to a fixed set of streams, and announcement
|
||
streams, where only organization owners and administrators can post.
|
||
- By default, users can maintain their own names and email addresses, but
|
||
Zulip also supports
|
||
[restricting changes](/help/restrict-name-and-email-changes) and
|
||
synchronizing these data from another database (such as
|
||
[LDAP/Active Directory][ldap-name]).
|
||
- Zulip provides many options for
|
||
[managing who can join the organization](/help/invite-new-users),
|
||
supporting everything from open to the public (e.g. for open source
|
||
projects), to requiring an invitation to join, to having an email from a
|
||
list of domains, to being a member of a specific organization in
|
||
LDAP/Active Directory.
|
||
- Zulip can limit the features that new users have access to until their
|
||
accounts are older than a [configurable waiting period][waiting_period].
|
||
- Zulip also supports customizing whether non-admins can
|
||
[create streams](/help/configure-who-can-create-streams),
|
||
[invite to streams](/help/configure-who-can-invite-to-streams),
|
||
[add custom emoji](/help/only-allow-admins-to-add-emoji),
|
||
[add integrations and bots](/help/restrict-bot-creation),
|
||
[edit or delete messages](/help/configure-message-editing-and-deletion),
|
||
and more.
|
||
|
||
[waiting_period]: /help/restrict-permissions-of-new-members
|
||
[ldap-name]: https://zulip.readthedocs.io/en/latest/production/authentication-methods.html#ldap-including-active-directory
|
||
|
||
## Authentication
|
||
|
||
- Zulip supports integrated single sign-on with Google, GitHub, SAML
|
||
(including Okta), AzureAD, and Active Directory/LDAP. With Zulip
|
||
on-premise, we can support any of the 100+ authentication tools
|
||
supported by
|
||
[python-social-auth](https://python-social-auth.readthedocs.io/en/latest/backends/index.html#social-backends)
|
||
as well as [any SSO service that has a plugin for
|
||
Apache][apache-sso].
|
||
- Zulip uses the zxcvbn password strength checker by default, and supports
|
||
customizing users’ password strength requirements. See our documentation
|
||
on
|
||
[password strength](https://zulip.readthedocs.io/en/latest/production/security-model.html#passwords)
|
||
for more detail.
|
||
- Users can rotate their accounts’ credentials, blocking further access from
|
||
any compromised Zulip credentials. With Zulip on-premise, server
|
||
administrators can additionally revoke and reset any user’s credentials.
|
||
- Owners can deactivate any [user](/help/deactivate-or-reactivate-a-user),
|
||
[bot, or integration](/help/deactivate-or-reactivate-a-bot). Administrators
|
||
can also deactivate any [user](/help/deactivate-or-reactivate-a-user),
|
||
[bot, or integration](/help/deactivate-or-reactivate-a-bot) except owners.
|
||
- With Zulip on-premise,
|
||
[session length](https://github.com/zulip/zulip/search?q=SESSION_COOKIE_AGE&type=code) and
|
||
[idle timeouts](https://github.com/zulip/zulip/search?q=SESSION_EXPIRE_AT_BROWSER_CLOSE&type=code)
|
||
can be configured to match your organization’s security policies.
|
||
|
||
[apache-sso]: https://zulip.readthedocs.io/en/latest/production/authentication-methods.html#apache-based-sso-with-remote-user
|
||
|
||
## Integrity and auditing
|
||
|
||
- Zulip owners and administrators can configure users’
|
||
[ability to edit or delete messages](/help/configure-message-editing-and-deletion),
|
||
and whether deleted messages are retained in the database or deleted
|
||
permanently. Zulip by default stores the complete history of all message
|
||
content on the platform, including edits and deletions, and all uploaded
|
||
files.
|
||
- Zulip’s server logging has configurable log rotation policies and can be
|
||
used for an end-to-end history of system usage.
|
||
- Zulip stores in its database a permanent long-term audit log containing
|
||
the history of important actions (e.g. changes to passwords, email
|
||
addresses, and stream subscriptions).
|
||
- Zulip’s powerful data exports
|
||
([on-premise](https://zulip.readthedocs.io/en/latest/production/export-and-import.html),
|
||
[cloud](/help/export-your-organization)) can be imported into third-party
|
||
tools for legal discovery and other compliance purposes. Zulip’s
|
||
enterprise offerings include support for integrating these with your
|
||
compliance tools.
|
||
- Zulip supports GDPR and HIPAA compliance.
|
||
|
||
|
||
## The little things
|
||
|
||
Many products talk about having great security and privacy practices, but
|
||
fall short in actually protecting their users due to buggy code or poor
|
||
operational practices.
|
||
|
||
Our focus on security goes beyond a feature checklist: it’s a point of
|
||
pride. Zulip founder Tim Abbott was previously the CTO of Ksplice, which
|
||
provided rebootless Linux kernel security updates for over 100,000
|
||
production servers (now the flagship feature of
|
||
[Oracle Linux](https://www.oracle.com/linux/)).
|
||
|
||
Here are some security practices we’re proud of, all of which are unusual in
|
||
the industry:
|
||
|
||
- The Zulip server’s automated test suite has over 98% test coverage,
|
||
including 100% of Zulip’s API layer (responsible for parsing user input).
|
||
It is difficult to find any full-stack web application with as complete a
|
||
set of automated tests as Zulip.
|
||
- Zulip’s Python codebase is written entirely in
|
||
[statically typed Python 3](https://blog.zulip.org/2016/10/13/static-types-in-python-oh-mypy/),
|
||
which automatically prevents a wide range of possible bugs.
|
||
- All access to user data (messages, streams, uploaded files, etc.) in the
|
||
Zulip backend is through carefully-audited core libraries that validate
|
||
that the user who is making the request has access to that data.
|
||
- Only a small handful of people have access to production servers or
|
||
to sensitive customer data.
|
||
- Our error handling systems have been designed from the beginning to
|
||
avoid including user message content in error reports, even in cases where
|
||
this makes debugging quite difficult (e.g. bugs in the message rendering
|
||
codebase).
|
||
- Zulip has a carefully designed API surface area of only about 100 API
|
||
endpoints. For comparison, products of similar scope typically have
|
||
hundreds or even thousands of endpoints. Every new API endpoint is
|
||
personally reviewed for security and necessity by the system architect Tim
|
||
Abbott.
|
||
|
||
These security practices matter! Slack, the most popular SaaS team chat
|
||
provider, has needed to award
|
||
[hundreds of bounties](https://hackerone.com/slack) for security bugs found
|
||
by security researchers outside the company.
|
||
|
||
## Further reading
|
||
|
||
- Detailed
|
||
[security model documentation](https://zulip.readthedocs.io/en/latest/production/security-model.html)
|