This document outlines the security best practices and frameworks upon which the CoScreen collaboration platform by Datadog is developed and maintained to keep its customers and their data safe.
CoScreen leverages the fully managed web application platforms Google Firebase and AWS (Amazon Web Services). For further information about Firebase security processes and how they comply with information security standards, please refer to their Privacy and Security in Firebase document and specifically the ISO and SOC-compliance section.
CoScreen also uses the Jitsi-as-a-Service platform by the ISO 27001, FISMA, NIST-compliant, and HIPAA-compatible vendor 8x8. It provides enterprise-grade SFU (Selective Forwarding Unit) video relay infrastructure for multi-point conferences. For further information regarding 8x8’s security processes and the enterprise-readiness of their platform, please refer to 8x8 Security and Compliance.
Firebase fulfills the ISO 27001 standard (Firebase ISO 27001 certificate) which is a security management standard that specifies best practices and comprehensive security controls. AWS also fulfills this standard: AWS ISO 27001 Compliance FAQs. 8x8 is also ISO 27001-compliant (8x8 Security and Compliance).
Firebase/Google follows the EU General Data Protection Regulation and acts as a GDPR data processor - more information can be found under Privacy and Security in Firebase. All AWS services are also GDPR-ready. 8x8 is also GDPR-compliant, details can be found in the 8x8 GDPR FAQ.
Datadog's AWS services employ encrypted storage for all user data and supports data export and removal on request.
8x8, which handles the infrastructure used to transmit shared content of CoScreen users in some scenarios, is also HIPAA-compatible (Health Insurance Portability and Accountability Act) and FISMA-compliant (Federal Information Security Management Act). Details can be found in the 8x8 Security FAQ.
Security incidents can be brought to attention by sending an email to email@example.com.
Datadog has implemented a formal Business Continuity Plan and Disaster Recovery process to implement the policies, tools, and procedures to enable the recovery or continuation of vital technology infrastructure and systems following a business disruption that might be, but does not have to be, related to security incidents.
The status of the CoScreen infrastructure and services as well as customer-facing incidents are published on https://coscreen.statuspage.io/.
Datadog runs business continuity tests on a regular basis.
CoScreen’s infrastructure is monitored automatically using and an alerting system is set up to ensure that the CoScreen team is able to swiftly react to incidents.
System uptime is monitored through Google Cloud Platform for Firebase and Datadog.
System status and service quality of 8x8 JaaS is monitored using the platform-internal monitoring tools.
CoScreen only captures encrypted session metadata for purposes like billing and product quality. Access to session metadata is limited to employees and systems that require access.
CoScreen does not store any video streams of shared screens, remote control input, audio or video chat data unless requested by the user. CoScreen captures email addresses of end-users as identifiers and for internal session management and to coordinate activities between end-users (e.g. invites), but uses anonymized IDs in connected systems whenever possible (e.g. for error logging).
Credentials and access tokens used for customer systems and third-party systems are stored securely and are never transmitted via emails, chat, or similar. If credentials are exposed by accident, they are revoked and reissued.
Employees do not store credentials in their development environments.
CoScreen operates in two distinct environments: development, and production.
Access controls are in place between those environments, with changes to access levels continuously managed and reviewed by authorized personnel.
The purpose of the environments are as follows:
All code is statically analyzed for security flaws on every merge request using SonarQube:
All merge requests affecting production code are reviewed by a second pair of eyes with security in mind.
To minimize the potential harm of an incident, all servers, applications, and users are granted the minimal set of privileges possible for the task they perform. This includes but is not limited to firewall rules, AWS API permissions, and database privileges.
All user roles in critical systems are only accessible via multi-factor authentication, using a physical device or the Google Authenticator app.
Select access control measures:
All application development is managed in accordance with the best practices outlined by the Open Web Application Security Project (“OWASP”) Top 10 in terms of developer and web application security.
OWASP and other common vulnerabilities are continuously tested with every merge request.
CoScreen infrastructure is continuously kept up-to-date in terms of security updates and regularly scanned in terms of security, reliability, and maintainability matters using Datadog's security portfolio.
In addition, port scans are done regularly to ensure systems are configured securely.
All traffic from and between CoScreen applications and services is encrypted and transmitted over HTTPS/TLS.
Datadog has a formal Supplier Risk Management Policy in place to ensure that suppliers, vendors, and their sub-contractors are being held to the highest standards.
Data exchanged between end-users and CoScreen servers is always transmitted over encrypted connections.
Any windows which are shared between CoScreen customers, as well as their audio and video chat traffic, are encrypted and transmitted using DTLS-SRTP (IETF memo), the enterprise-grade standard for secured WebRTC connections (more on WebRTC security).
CoScreen does not record or store any shared window content, remote control input, audio or video chat data.
Whenever two collaborators can establish a direct connection between them (P2P/Peer-to-Peer, NAT Traversal), shared content is transmitted directly between them and is end-to-end encrypted, without touching any CoScreen infrastructure.
When two collaborators cannot establish a direct connection between themselves, e.g. due to corporate firewalls and VPNs, shared content is encrypted and transmitted over a secured TURN (Traversal Using Relays around NAT) infrastructure so that customers can connect under any network condition.
Shared content is always encrypted during transmission. The global TURN infrastructure is managed by CoScreen’s HIPAA-compatible partner 8x8, which offers the enterprise-grade platform using the highest levels of security and compliance policies and procedures.
Because P2P connections do not scale performantly for more than two participants (details here), CoScreen sessions with more than two collaborators will be handled via the globally distributed video bridge infrastructure by our partner 8x8.
Shared content is always encrypted during transmission. The global video bridge infrastructure is managed by CoScreen’s HIPAA-compatible partner 8x8, which offers this enterprise-grade platform using the highest levels of security and compliance policies and procedures (more in the section on Security Standard Compliance). No customer video/audio/screen/control data passes through CoScreen infrastructure
The video infrastructure relies on the mature open-source framework Jitsi (learn more: Jitsi Meet Security & Privacy). For large scale-deployments, the local deployment of the video infrastructure as on-premise/in-house installation can be explored.
End users can register and authenticate with CoScreen using a Google or Datadog account or by entering an email address that has to be confirmed by CoScreen through an email verification flow.
Strong password requirements are enforced and must contain the following:
CoScreen enables end-users to share windows individually and keep the rest of their desktop private. This reduces the chances for them to share information accidentally.
Windows that are shared are transmitted as encrypted video streams and not recorded, stored, or accessed by CoScreen personnel and infrastructure.
If users only share individual windows, their collaborators can only control individual shared windows and their child windows, not the entire operating system unlike in other remote collaboration solutions.
Access to critical systems is restricted at the individual level based on role and responsibilities. Examples of access restrictions include superuser access (admins only), production, environment access, and AWS IAM policy groups limiting resources.
Shell access for administrative tasks uses SSH. Only public key-based authentication is allowed, using unique keys for each user.
All critical systems leverage encrypted storage.
Centralized logging is in place for all critical AWS infrastructure to enable traceability in the event of an incident.
Examples of event logging include:
It is mandatory for all employees to use a password manager for all work-related passwords.
All work-related passwords managed by the password manager must be generated using a password recipe following these minimal guidelines.
Employees are highly encouraged to utilize the strongest password recipe possible for all services.
MFA (also known as Two Factor Authentication or Two-Step Authentication) must be enabled for the following services and should be used for any service that provides it.
Software development at Datadog is done according to industry best practices: formal code reviews, pair programming, automated and manual testing, continuous deployment, production logging and alerts, and regular quality and performance benchmarking.
Datadog has also put in place a formal Configuration and Change Management policy and established a process for provisioning, hardening, securing, and locking down all system components prior to full deployment to production. This process helps ensure that standardized methods and procedures are used for efficient and prompt handling of all changes, in order to minimize the impact of change-related incidents upon service quality, and consequently improve the day-to-day operations of the organization.
Employees are required to complete information security policy, security awareness, and incident response training upon hire. Employees also review security policies and best practices on an ongoing basis. In addition, engineers are required to take Secure Coding Training.
The security officer or their deputy performs a bi-monthly review to make sure that employees follows the policies in this section.
At the end of employment, either by resignation or termination, the security officer or their deputy will revoke access to any critical systems, email accounts, and all other systems.
The employee is bound by law and/or employment contract depending on jurisdiction to erase all data and other immaterial property rights from any medium, including physical copies and printouts at the end of employment.
Contact for questions or concerns: firstname.lastname@example.org