Security

We take security with the utmost importance here at Interseller. Here’s what we do to ensure we keep all of our data safe.

Encryption.

  • All requests to Interseller including any interim connections across Interseller’s infrastructure is secured with HTTPS and/or SSL. Any connection or request using unsecured protocols, like HTTP, are redirected to its counterpart or terminated.
  • Interseller uses HSTS, a protocol with well-known browsers that lets them know and enforce that our website uses HTTPS and should ignore HTTP.
  • All data and customer data is encrypted at rest and encrypted in transit.
  • All secret keys and customer keys (e.g. integrations) are encrypted with hardware security modules (HSM) for extra protection.
  • Credit cards are stored and processed security with Stripe, which is PCI Level 1 compliant.

Infrastructure.

  • All data is hosted and secured in a private environment. All publicly facing endpoints and IP addresses are firewalled.
  • Access to our environment requires two-factor authentication and is allowed only from well-known employee IP addresses. Access attempts are logged securly and audited in real-time.
  • We utilize denial of service (DOS) protection services and web application firewalls (WAF) to ensure our services are protected from attacks.
  • Our infrastructure is audited automatically and our team follows a strict 30-day SLA to patch all infrastructure vulnerabilities.

Compliance.

  • Greenhouse is Data Privacy Framework (EU-U.S.; UK Extension to the EU-U.S.; and Swiss) certified and complies with the EU General Data Protection Regulation (GDPR). Please visit https://www.greenhouse.com/data-processing-addendum if you would like to access and sign our DPA.

Inbox Access.

  • Interseller has access to your inbox so that we can send emails on your behalf and know when your contacts in Interseller reply back to you.
  • Interseller does not store any copies of your inbox on its servers. Interseller does keep copies of emails we send on your behalf and the first response from a contact directly to an email we’ve sent.

Third Parties.

  • Interseller utilizes third parties to help us with support and account management services.
  • Data shared to our third parties are limited to name and email address only. Absolutely no email data is ever shared with our partners.
  • Interseller periodically audits its third-parties and partners to ensure the that our customer data is kept secure.

Internal Policies.

  • We enforce two-factor authentication (2FA) with all sensitive data processors such as Slack, G Suite, Intercom and Stripe.
  • We utilize a password manager to secure online accounts and share them across our team.
  • We go through yearly scheduled security testing including security assessments with our partners. To obtain a copy of our report, please email privacy@interseller.io.
  • Greenhouse is SOC 2 certified and has finished its Type 2 audit. To obtain a copy of our report, please email privacy@interseller.io.
  • All employees and contractors sign a non-discolsure agreement.

Bounty Program.

We ask for security researches to report any security exploit to our HackerOne page under app.greenhouse.io. Qualifying reports will be answered within 5 days and will be paid on patch release. Reward amounts will depend exclusively on the severity of the vulnerability and has an upper limit of $500.00 USD. We do not reward researches for the following:

  • DOS;
  • Automated scripts;
  • Mixed-content scripts;
  • Social engineering;
  • Regular bugs;
  • Email flooding;
  • Input
  • Or not adhering to “best practices”

Please include the following information when submitting a report:

  • Technical details of the vulnerability. Please include step-by-step instructions so we can reproduce it on our side. A video is greatly appreciated.
  • Scope and impact of the vulnerability including what type of data an attacker can access.