Security Portal

Get access to this Security Portal
Had access before? Reclaim access

Overview

Rootly has implemented best-in-class security practices to keep customer data safe and operates in the most regulated markets.

100+ global organizations from startups to F500 trust Rootly to be their incident management solution of choice.

Contact: security@rootly.com

Compliance

CCPA Logo
CCPA
GDPR Logo
GDPR
SOC 2 Logo
SOC 2
Get access to this Security Portal
Had access before? Reclaim access

Rootly is reviewed and trusted by

CanvaCanva
GrammarlyGrammarly
WealthsimpleWealthsimple
FaireFaire
BoltBolt
PoshmarkPoshmark
ShellShell
Cypress.ioCypress.io
RivianRivian
SquarespaceSquarespace

Documents

9 Documents
Network Diagram
Pentest Report
SOC 2 Report
Vulnerability Assessment Report
Cyber Insurance
Data Processing Agreement
Master Services Agreement
Business Continuity Policy

Product Security

Role-Based Access Control
Audit Logging
Data Security
See more

Reports

Network Diagram
Pentest Report
SOC 2 Report
See more

Data Security

Access Monitoring
Backups Enabled
Data Erasure
See more

App Security

Responsible Disclosure
Code Analysis
Software Development Lifecycle
See more

Access Control

Data Access
Logging
Password Security

Infrastructure

Anti-DDoS
Amazon Web Services
BC/DR
See more

Endpoint Security

Disk Encryption
Endpoint Detection & Response
Mobile Device Management

Network Security

Data Loss Prevention
Security Information and Event Management
Zero Trust

Corporate Security

Email Protection
Employee Training
Incident Response
See more

Policies

Business Continuity Policy

Trust Center Updates

CVE-2022-3602 & CVE-2022-3786

After careful review of our infrastructure and SBOM, the Rootly team has determined that we are not currently vulnerable to the OpenSSL 3 vulnerabilities CVE-2022-3602 and CVE-2022-3786 that were disclosed on November 1, 2022.

Published at 11/02/2022, 9:54 PM

CVE-2022-21449

None of our services are running Java 15, 17, and 18 so this vulnerability (CVE-2022-21449) is not exploitable on our side.

Published at 05/16/2022, 9:44 PM

If you think you may have discovered a vulnerability, please send us a note.