Skip to content

Commit 281691e

Browse files
terezavrchovinovaTC-MOBraniganLee
authored
docs: improve clarity and formatting in security documentation, add vdp (#1622)
Co-authored-by: Michał Olender <[email protected]> Co-authored-by: Daniel Lee <[email protected]>
1 parent 4a44264 commit 281691e

File tree

1 file changed

+60
-13
lines changed

1 file changed

+60
-13
lines changed

sources/platform/security.md

Lines changed: 60 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -14,46 +14,93 @@ slug: /security
1414

1515
## SOC 2 type II compliance
1616

17-
The Apify platform is SOC 2 Type II compliant. This means that we have undergone an independent audit to ensure that our information security practices, policies, procedures, and operations meet the SOC 2 standards for security, availability, and confidentiality of customer data.
17+
The Apify platform is SOC 2 Type II compliant. This means that we have undergone an independent audit to ensure that our information security practices, policies, procedures, and operations comply with SOC 2 standards for security, availability, and confidentiality of customer data.
1818

1919
<a href="https://www.aicpa-cima.com/topic/audit-assurance/audit-and-assurance-greater-than-soc-2" target="_blank" title="AICPA SOC 2">
2020
<img src={require("./images/security/soc2-logo.png").default} width="150" title="Apify Security Whitepaper" />
2121
</a>
2222

23-
To learn more read the [announcement](https://blog.apify.com/apify-soc2/) and visit our [Trust Center](https://trust.apify.com) for more information and to request a copy of our SOC 2 Type II report.
23+
To learn more, read the [announcement](https://blog.apify.com/apify-soc2/) and visit our [Trust Center](https://trust.apify.com) for additional information or to request a copy of our SOC 2 Type II report.
2424

2525
## Trust center
2626

27-
To learn more about Apify's security practices, data protection measures, and compliance certifications, visit our [Trust Center](https://trust.apify.com). The Trust Center includes:
27+
To learn more about Apify's security practices, data protection measures, and compliance certifications, please visit our [Trust Center](https://trust.apify.com). The Trust Center includes:
2828

2929
- List of our security certifications and compliance reports
3030
- Information about Apify's data protection controls
3131
- List of Apify's data subprocessors
32-
- AI Chatbot for answering your questions about security
32+
- An AI chatbot to answer your security-related questions
3333

34-
## Security whitepaper
34+
## Security Whitepaper
3535

36-
At Apify, security is the top priority of our daily work. Security best practices are reflected in our development, deployment, monitoring, and project management processes.
37-
Read the Apify Security Whitepaper for a full description of Apify's measures and commitments to security:
36+
At Apify, security is our top priority every day. Security best practices are reflected in our development, deployment, monitoring, and project management processes.
37+
Read the Apify Security Whitepaper for a comprehensive description of Apify's security measures and commitments:
3838

3939
<a href="https://apify.com/security-whitepaper.pdf" target="_blank" title="Apify Security Whitepaper">
4040
<img src={require("./images/security/whitepaper-cover.png").default} width="50%" title="Apify Security Whitepaper" />
4141
</a>
4242

43-
## Reporting a vulnerability
43+
## Vulnerability disclosure policy
4444

45-
If you notice or suspect a potential security breach, please report this immediately to our security team at [[email protected]](mailto:[email protected]), including all the technical details.
45+
We invite security researchers, ethical hackers, and the broader community to help us keep Apify safe by reporting any potential security vulnerabilities or weaknesses. Your responsible disclosure helps protect our users and strengthen the Apify platform.
46+
47+
_Scope:_
48+
The following Apify services and domains are eligible for security research and responsible reporting:
49+
50+
- [apify.com](https://apify.com)
51+
- [console.apify.com](https://console.apify.com)
52+
- [api.apify.com](https://api.apify.com)
53+
54+
Please use your own test account for research purposes. Free accounts are sufficient for most testing.
55+
56+
_Out-of-scope:_
57+
58+
- Issues with third-party systems
59+
- Clickjacking on non-sensitive pages
60+
- SPF/DKIM/DMARC or other email configuration issues
61+
- Best practices or informational findings without impact
62+
- Denial of Service (DoS), brute-force attacks, and resource exhaustion
63+
- Social engineering, phishing, or physical attacks
64+
- Attacks requiring MITM or stolen credentials
65+
66+
_We are especially interested in reports that demonstrate:_
67+
68+
- Unauthorized access to data
69+
- Elevation of privileges
70+
- Server-side vulnerabilities (e.g., SSRF, RCE)
71+
- Cross-site scripting (XSS) and injection attacks
72+
- Logic flaws impacting account integrity or billing
73+
- Authentication/authorization issues
74+
- Data leaks due to misconfiguration
75+
76+
### Reporting process
77+
78+
If you notice or suspect a potential security issue, please report it to our security team at [[email protected]](mailto:[email protected]) with as much detail as possible, including the following:
79+
80+
- Clear description of the issue
81+
- Step-by-step reproduction instructions
82+
- PoC (screenshots or code snippets)
83+
- Impact analysis
84+
- Affected URL or endpoint
85+
86+
### Rules of engagement
87+
88+
- Only target accounts or data you control (test accounts)
89+
- Never disrupt our services or other users
90+
- Avoid privacy violations and do not destroy or alter data
91+
- Automated scanners are not permitted without prior approval
92+
- No spam, DoS, or social engineering
93+
- Submit one vulnerability per report (unless chaining is required)
94+
95+
If you follow these guidelines and act in good faith, we will not take legal action against you for responsibly reporting a security issue.
4696

4797
:::warning
4898

4999
Please refrain from publicly disclosing the vulnerability until it has been resolved. This ensures that the issue can be properly evaluated and mitigated before being exposed to potential exploitation.
50100

51101
:::
52-
The total compensation for your report will be highly dependent on the severity, complexity, and exploitability of the vulnerability. Your reports are always verified by our internal security team,
53-
which also weighs in on various risks associated with that vulnerability and how major of an impact it would have in case we were attacked.
54102

55-
We strive to reply to all reports within 5 working days. However, depending on the complexity of the issue or our current workload, our response might take longer.
56103

57104
## Securing your data
58105

59-
The Apify platform provides you with multiple ways to secure your data. This includes [encrypted environment variables](./actors/development/programming_interface/environment_variables.md) to store your configuration secrets and [encrypted input](./actors/development/actor_definition/input_schema/secret_input.md) to secure the input parameters of your Actors.
106+
The Apify platform provides you with multiple ways to secure your data, including [encrypted environment variables](./actors/development/programming_interface/environment_variables.md) for storing your configuration secrets and [encrypted input](./actors/development/actor_definition/input_schema/secret_input.md) for securing the input parameters of your Actors.

0 commit comments

Comments
 (0)