Security & compliance
The security, integrity, and availability of your data are our top priorities. We know how vital it is to your business success. To ensure you never have to worry, we use a multi-layered approach to protect and monitor all your information.
- We strive to follow industry best practices when it comes to security and compliance using frameworks and guidelines such as OWASP, NIST, CIS, and CSA.
- Data protection: Your data is protected in rest by AES256 encryption and in transfer using TLS 1.2
- Our SOC, security operations center, is staffed 24/7 and is a centralized unit that deals with security issues on an organizational and technical level. Tasks include but not limited to: Weekly Vulnerability scans, Log analysis, anomaly detection, pattern deviation, threat hunting, firewall rule monitoring, deviation in port openings, and impossible logins.
- Security penetrations tests are performed at least annually by a third party.
- Continuous improvements are carried out by conduction security architecture review, threat intelligence & threat monitoring.
- Security Awareness training - Mandatory yearly training for all users and additional specific training for operations, support and security staff
- Crisis Management and Incident Management Training for staff are done with both tabletop exercises and different types of gamification.
Sinch is committed to maintaining the safety and security of our services and our customers’ information. We encourage earnest, responsible reporting of potential vulnerabilities in any service, product, system, or asset made by or belonging to Sinch.
Security Vulnerability Submission Process
If you believe you have found a vulnerability in a Sinch service, product, system, or asset, please submit the vulnerability information to Sinch through an encrypted communication method. For submission via Email, please send an encrypted file detailing your submission. Encrypt your file using our public encryption key here.
To enable Sinch to remedy the vulnerability, please report it as soon as possible after discovering it and provide a detailed summary of the vulnerability, including the following if known:
- A description of the finding and how it was discovered
- The service(s), product(s), system(s), or asset(s) affected
- Reproduction instructions to enable Sinch to validate the vulnerability (e.g., actions and results)
- Provide detailed information about your findings (including available indications, for example, IP addresses, logs, screenshots).
- Your contact information and PGP key. You can submit this information anonymously.
Personal data Sinch receives in connection with your submission will be retained and protected under the company’s privacy policies and any applicable laws.
A Sinch representative will acknowledge receipt as soon as possible, typically within 48 hours.
Submit any vulnerability information following these guidelines:
- Do not engage in any activity that can potentially cause harm to Sinch, our customers, or our employees.
- Do not engage in any activity that can potentially stop or degrade Sinch services, products, systems, or assets.
- Do not engage in any activity that violates (a) federal or state laws or regulations or (b) the laws or regulations of any country where (i) Sinch data, services, assets or systems reside, (ii) Sinch data traffic is routed or (iii) the researcher is conducting research activity.
- Do not store, share, compromise or destroy Sinch or customer data. If Personally Identifiable Information (PII) is encountered, you should immediately halt your activity and contact Sinch.
- Do not initiate a fraudulent financial transaction.
- Provide Sinch reasonable time to fix any reported issue, before such information is shared with a third party or disclosed publicly.
Contact details: email@example.com
Sinch cloud communications platform for messaging, voice, and video and Sinch Operator Software is certified under the framework established by a Bureau Veritas Certification quality management system conforming to ISO 27001. Bureau Veritas Certification Certificate No: IND.20.1863/IS/U
Sinch believes certification is key to displaying our best practice in Information Security Management and our commitment to building customer trust.
What is ISO 27001?
The ISO 27001 certificate is the most globally recognized information security standard defined by the International Organization for Standardization (ISO). As the top certification for Information Security
Management Systems (ISMS), it prescribes a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes, and IT systems by applying a risk management process.
What does this mean for you as a customer?
We take the security of your information seriously and have implemented sophisticated security measures to safeguard it. We want our customers to rely on and fully trust our technology and services.
Getting ISO 27001 certified is a testament to the fact that Sinch prioritizes data security. But it also ensures that we:
- Protect customer data rigorously
- Assess, minimize, and eliminate risks and vulnerabilities
- Work continuously with our security maturity
- Achieve operational excellence regarding our IT, HR, and information processes
Our mission to security doesn’t end here. Information security is an ongoing process and we will keep working hard to maintain and exceed our standards to protect both company and customer data. Yearly audits will be performed by an external auditor to attest to our continuous compliance as we continue to develop and grow our business.
Sinch has a business continuity plan in place that is tested and updated at least annually.
Benefits we have already realized in the process:
Sinch now has the freedom to operate without the use of its global office network. Through our business continuity planning, we have freed ourselves from the physical office and can securely offer Sinch services to our clients in the event of natural disasters or pandemics.