Last Updated: April 1, 2017
Passwords are stored in a salted encrypted format, unless you specify otherwise. Unless cleartext passwords are enabled, site administrators cannot see user passwords.
Administrators can require users to change their password on their next login.
Administrators can restrict access to certain IPs or IP ranges, either on a per-user or site-wide basis.
We support 2048-bit SSL encryption for all FTP and HTTP connections to the Service. This is an extremely high level of encryption.
For HTTP (web workspace) connections, SSL encryption (https://) is required for all connections. If a user attempts to connect to the web workspace via unsecured HTTP (http://), we will automatically redirect them to the secure HTTP address (https://).
For FTP (file transfer protocol) connections via port 990, 2048-bit SSL encryption is supported and required on all connections.
For FTP (file transfer protocol) connections via port 21, 2048-bit SSL encryption is supported and required by default. You may configure your account to allow insecure FTP connections by setting an option in the Security tab of the Configuration page.
Files are encrypted-at-rest, with all encryption keys stored in a key-management escrow service operated by Amazon S3. Applies to all files uploaded after October 5, 2011.
All of our server instances, file storage, and database hosting are provided by Amazon Web Services, a subsidiary of Amazon.com.
Amazon Web Services has achieved ISO 27001 certification and has successfully completed multiple SAS70 Type II audits.
Amazon has many years of experience in designing, constructing, and operating large-scale datacenters. This experience has been applied to the Amazon platform and infrastructure. Amazon datacenters are housed in nondescript facilities. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff must pass two- factor authentication a minimum of two times to access datacenter floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.
Amazon only provides datacenter access and information to employees and contractors who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, his or her access is immediately revoked, even if they continue to be an employee of Amazon or Amazon Web Services. All physical access to datacenters by Amazon employees is logged and audited routinely.
Automatic fire detection and suppression equipment has been installed to reduce risk. The fire detection system utilizes smoke detection sensors in all data center environments, mechanical and electrical infrastructure spaces, chiller rooms and generator equipment rooms. These areas are protected by either wet-pipe, double-interlocked pre-action, or gaseous sprinkler systems.
The data center electrical power systems are designed to be fully redundant and maintainable without impact to operations, 24 hours a day, and seven days a week. Uninterruptible Power Supply (UPS) units provide back-up power in the event of an electrical failure for critical and essential loads in the facility. Data centers use generators to provide back-up power for the entire facility.
Climate control is required to maintain a constant operating temperature for servers and other hardware, which prevents overheating and reduces the possibility of service outages. Data centers are conditioned to maintain atmospheric conditions at optimal levels. Personnel and systems monitor and control temperature and humidity at appropriate levels.
Our web and file servers run the Ubuntu Linux operating system distribution (currently, version 14.04 LTS). Our web application is developed using the latest version (version 4.2) of Ruby on Rails. We use MySQL 5.6 for our database servers.
We subscribe to the security announcement mailing lists for Linux, Ubuntu and Ruby on Rails and install critical security updates as soon as possible after they are released using an automatic package upgrade installation system.
We install non-critical and non-security related software updates to Ubuntu automatically on a rolling basis.
Updates to MySQL are managed by Amazon, and they install critical security updates as quickly as possible.
Our servers are Amazon EC2 Server Instances.
Our servers are kept behind a firewall (configured in a default deny mode) and only the ports necessary for operation are exposed to the public Internet.
Files are hosted using Amazon's S3 Simple Storage Service. Amazon S3 provides a highly durable storage infrastructure designed for mission-critical and primary data storage.
Only Action Verb LLC employees with a legitimate business need have the ability to log-in to our servers or databases directly.
Access is removed from employees immediately if they leave the company or no longer have a business need to access the servers.
Our billing and signup processes are also PCI-compliant. PCI is the Payment Card Industry standard for cardholder data security.
This should not be misunderstood to mean that you may store protected cardholder data in BrickFTP. We have NOT attempted to ensure PCI-compliance for the data that our customers upload.
To ensure that nobody accidentally transfers a file on your account using insecure FTP or HTTP, enable the "Require SSL" option in the Security tab of the Configuration page. This is especially important if you are using your own domain name, as we will otherwise disable SSL by default on the web interface.
Do not enable the Insecure Ciphers option on the Security Tab of the Configuration page.
On the Security tab of the Configuration page, set the backup retention period as low as possible to minimize the amount of your data we retain as backups. For maximum security, you should set this value to be no higher than 30 days. Many of our customers enter lower values such as 7 days or even 0 days.
BrickFTP has many customers who are subject to the Health Insurance Portability and Accountability Act (HIPAA). As such, we are aware of the relevant requirements and have designed our service to be compatible with HIPAA compliance.
Depending on your exact use of BrickFTP, you may need to enter into a Business Associate Agreement (BAA) with BrickFTP. We provide a pre-written and pre-approved agreement that you will need to use. Simply download the BrickFTP HIPAA Business Associate Agreement, sign it, and send it to us. We'll return an executed copy. The linked BAA form is only valid once signed by you and executed by us. Should you require changes to this form, you will need to contact us.
The rest of this document explains the various physical and technical measures we use to protect your data. You may refer to it in any internal auditing that you perform.
Please be sure to follow the steps in the For Maximum Security section above to ensure that you have configured BrickFTP to be compliant.
We continually improve the security of BrickFTP by using automated vulnerability scanning tools. In addition we offer the security research community a Security Bug Bounty.
Action Verb LLC strives to stay up-to-date with the latest best practices, and as such reserves the right to change the exact implementation of our technology platform at any time. If we make a substantial change that affects security matters, we will alert BrickFTP™ paying customers of such change via E-Mail. Your continued use of the Service following such changes will indicate your acceptance of those changes.
This document was last updated according to the date at the top of this page.
Questions regarding this document should be sent by e-mail to us using our online contact form.