shield-checkData Safety

At SharpSync we take the safety of your data very seriously.

While we would all like to pretend that penetrations never happen, and data has never leaked, no one is truly safe and the risk of IP exposure is real due to phishing attacks or compromised user machines. Most successful attacks are not because the hackers break into the system. It's usually due to compromised user credentials (stolen via browser extensions) or phishing attacks.

That's why we are transparent about our safety mechanisms and the steps we take to ensure your data is protected at all times. We employ industry-leading encryption protocols to safeguard your data both in transit and at rest. Our systems undergo regular security reviews, and we implement multi-factor authentication (MFA) and continuous monitoring to prevent unauthorized access.

We also have strict access control measures in place, ensuring only authorized personnel can interact with sensitive information for the purposes of troubleshooting and service delivery.

Per Organization Access

Each organization in SharpSync is unique.

When logging in to SharpSync, you only see your organization's data. No other organization's data is visible, so it's not possible for you to see another organization's BOM details, or vice versa.

Per User Access

Each user in SharpSync is unique.

When logging in to SharpSync, you only see your login's BOM data. No other user's data is visible, so it's not possible for you to see another organization's BOM details, or vice versa.

The exception to this is when another user (in the same organization) shares a Bill of Materials with you explicitly using the 'Share' or 'Transfer' button.

Multifactor logins (MFA / 2FA)

By default SharpSync uses username and password combinations. Our authentication provider is Auth0, and they support a wide range of logins. We trust them as the industry leader in authentication.

If you would like to use a different Identity Provider such as SAML, OpenID Connect, SSO, LDAP, Azure AD, Google or Octa reach out to us for pricing information.

circle-info

SharpSync does not store usernames and passwords for user logins, and never will.

Role Based Access Controls

We provide access to setup and administration via role based access controls. The roles are:

Role name
Description

Administrator

Can edit data sources, property mappings and BOMs, Billing, Users and more.

Editor

Can edit, transfer & view BOMs

Viewer

Can transfer & view BOMs

An editor and viewer cannot view the setup connection details for a DataSource. This means sharing a BOM with a colleague does not give that person visibility on how you connect to your sources.

This is great for inviting other users to your SharpSync instance and sharing BOM information with them without exposing your authentication secrets. Each user's session is authenticated individually with a source and kept separate from other users.

See more about permissions at Application Permissions and User management

Data Governance: Pre-empting Data Leaks

To pre-empt any potential data leakage or unauthorized access, the following mechanism(s) are in place:

Automatic deletion of unused or stale data

To prevent stale data from hanging around, we've implemented a 5 day stale data policy on the following data:

  • Bill of Material (BOM) data is only kept around for a maximum of 5 days.

  • Thumbnails

  • Metadata

  • Hierarchical data

  • File derivatives

  • Backup copies of derivatives

  • Organizational structure data is always kept (users, logins, property mappings, rules) , but bill of materials and related information is removed

Conditions for triggering

The removal of stale data condition is triggered when:

  • There is no activity in your account OR

  • You have not interacted with an individual Bill of Materials in 5 days.

When this condition is triggered, you will receive an optional email notifying you of the removal of the data. This does not delete the data at the source (i.e. CAD, PLM or ERP source), it simply removes your data from our servers.

Reduced logging

At SharpSync we use diagnostic logging to troubleshoot our software. This is what all great software companies do. We take this a step further by taking the following preventative measures:

  • We don't store any:

    • User names,

    • Identifying names

    • Company names

    • Account references.

  • We only store our application's internal ids for these objects

  • We automatically remove (delete) any log entries older than 7 days. This future proofs the logs by simply not making it available for a mining exfiltration attack.

Secure storage at rest

You user authentication credentials are stored in a vaultarrow-up-right. SharpSync staff does not have access to it unless you provide them with admin access to your instance.

If for any reason there are any problems with the server, or the data is taken offline, the vault is automatically locked and cannot be opened without a 3 part security key.

At SharpSync, we aim to give you the peace of mind that your data is in safe hands. Your trust is paramount, and we are committed to maintaining the highest level of security and transparency.

If there are any obligatory certifications that you have to adhere to and we can implement, please reach out to us for further discussion.

We support OAuth2.0 authentication flow for sources (if supported at the source), meaning that user credentials are not stored at SharpSync. Should this become the target of an attack, simply revoke the OAuth client id and secret at your source.

In addition, we support API keys or basic credentials for older sources that don't support OAuth2.0

Auditing

SharpSync has built in short term auditing for all customers and all objects. We record the following information and answer the following questions:

  • Who accessed the object?

  • When did they access it?

  • What action was performed?

  • What was the change?

The audit logs can be searched and is queryable by administrators.

Short term auditing

SharpSync's default audit log stores the last X entries per object. This means that every time you make an edit we only store the last X entries and remove the oldest entry. This is to protect you from the amount of data we store about you, and is sufficient for most use cases. Remember, the more information we store about you, the greater the chance that information leaks inside your own organization. So we keep this at an intentional minimum.

The value of X is configurable and can be increased based on user requirements. The default is 10 entries per object (it may seem like little, but usually this is enough). If you want longer storage please see Long term auditing.

Long term auditing

SharpSync does have long term auditing available as part of Enterprise implementations, but this comes at an additional cost. Long term logging stores the logs for as long as you would require and have the following features:

  • Log entries are tamper proof (each entry is calculated from the sum of the previous entry)

  • Log entries are stored long term (months to years)

  • Log rotation is not implemented (all logs are kept)

SharpSync staff access

SharpSync developers have access to select parts of the application, more specifically:

  • development + production servers

  • Back end infrastructure + environment (containers, databases, logs and source code)

  • Front end infrastructure + environment (containers, source code)

To prevent unauthorized access of databases and logs, credentials are assigned on an as-needed basis. A user will only have access to required servers or environment if it suits their role or support.

Reporting a data leak or breach

If you become aware of, or suspect, that you account has been breached, please take the following actions:

  • Take note of the date and time and the information disclosed

  • Immediately reset your account credentials

  • Notify us through our support channels (email or support ticket)

  • Notify your colleagues

Last updated