Security Policies

This document summarizes the internal security policies at Mattermost, Inc.

Security benefits of an open source platform

The open source Mattermost Team Edition is used by thousands of teams around the world. Development is aided by hundreds of open source contributors, with full access to the product source code, who have a vested interest in keeping the software secure and vetted.

As new threats emerge, a responsible disclosure policy is in place for the community to confidentially report security issues so they can be addressed by Mattermost, Inc. prior to documenting security updates publicly.

The commercial Mattermost Enterprise Edition extends the security and productivity benefits of the open source solution with support for advanced security, management, scale and policy compliance features for complex organizations.

Mattermost Development Guidelines

Tracking

  • Prior to implementation, potential code changes are discussed and documented in Mattermost’s issue tracking system.
  • Security tickets are confidential to Mattermost, Inc. staff, who are under NDA, and specially tagged to avoid disclosure.
  • All potential code changes are mapped to tickets prior to acceptance, with the exception of trivial changes and bug fixes.

Review

  • To uphold security, quality and reliability standards, all potential changes submitted by open source contributors must pass an accepting pull requests vetting process prior to submission.
  • Clarity and readability of code is enforced through Mattermost style guides.
  • After submission, all proposed changes require at least two code reviews for reliability, quality and system security.
  • All open source contributions are available for public inspection and commentary before and after acceptance.

Reporting

  • Mattermost uses a responsible disclosure policy to accept confidential reports of new threats, so they can be addressed either immediately through a dot release, or by the next bi-monthly release depending on potential impact.
  • When Mattermost software undergoes security and penetration testing at customer sites security updates are added to the core software and publicly documented by release.

Patch Management

  • Critical updates are released for urgent, high priority security issues or critical losses of functionality that should not wait for the next bi-monthly release.
  • Mattermost software has a mandatory upgrade policy and customers and users need to be on the latest release to receive critical updates.
  • Critical updates are delivered as dot releases, for example a critical update to release 3.1.0 would be named 3.1.1.
  • Customers and subscribers to the Mattermost Insiders mailing list receive notifications about all critical updates.

Security Review Checklist

In addition to checklists for quality and reliability, code changes receive multiple reviews for the following system security design principles:

  • Reducing information disclosure
  • Reducing attack surface
  • Protecting against denial of service vulnerabilities
  • Preventing message spoofing
  • Preventing cross-site scripting
  • Preventing cross-site forgery
  • Preventing remote code execution

Infrastructure Security Policies

  1. Technical infrastructure, including network security, servers and access control protocols are regularly reviewed for potential threats and vulnerabilities.
  2. Business process, HR process and policies are regularly reviewed for potential threats and vulnerabilities.

Business Continuity Plan

Mattermost, Inc. is headquartered in Palo Alto, California with a distributed organization across three timezones, and is therefore not easily affected by typical causes of business disruption, such as local failures of equipment, power, telecommunications, social unrest, fire, or natural disasters. Even so, threats considered in the context of business continuity are categorized by impact of the disruption.

Priority 1: Outages that would have immediate impact on a Mattermost customer

Key support staff unavailable in case of customer emergency.

Effect:

  • Emergency response times exceed expectations

Solution(s):

  • Level 1 (Critical Business Impact) and Level 2 (Major Business Impact) support requests are received by on-call support staff, as well as three supervisory staff who can monitor and escalate issues should the assigned staff member appear to be unavailable or unable to respond to the request within the SLA time allotted.
    • As an additional safeguard, when an L1 or L2 escalation is reported, a notification is sent via the company’s internal Mattermost instance to all qualified support staff to be aware of the issue, and any member can step in if it seems follow-up may not be achieved within SLA expectations.

Mitigation(s):

  • Mattermost, Inc. employs support staff and engineers in multiple timezones to increase availability, reduce response times and to reduce the risk that key support staff would be unavailable to service emergency requests.

Downtime for Mattermost Hosted Push Notification Service (HPNS)

Effect:

  • End users at customer sites deploying on HPNS do not receive mobile push notifications.

Solution(s):

  • Mattermost, Inc. can re-deploy the service from backup to new infrastructure, should its existing infrastructure suffer an outage.

Mitigation(s):

Disruption of infrastructure providing support over email, online tickets or Mattermost messaging during customer emergency

Effect:

  • Unable to communicate with Mattermost, Inc. support team during emergency

Solution(s):

  • Should a support channel be out-of-service, Mattermost, Inc. provides redundant support options through email, online ticketing and (for customers who have purchased core access premium support) online message via Mattermost.

Priority 2: Outages having immediate impact on business continuity

Outage due to malicious software (viruses, works, trojans and similar)

Effect:

  • Reduced capacity to continue business operations, depending on attack.

Solution(s):

  • Mattermost, Inc. staff uses multiple anti-virus solutions for detecting and removing malicious software and regularly backs up key systems to delete infected systems and re-deploy its infrastructure. Moreover, the company uses a range of Windows, Mac and Linux-based workstations, reducing the probability of a company-wide disruption from a single strain of malicious software.

Outage due to online attacks

Effect:

  • Reduced capacity to continue business operations, depending on attack.

Solution(s):

  • Mattermost, Inc. runs multiple monitoring and alerting services to detect and isolate suspicious traffic and requests in order to minimize downtime from potential online threats.
  • Should our self-hosted Mattermost instance be disrupted we can, if needed, quickly re-deploy the solution within our VPN.

Priority 3: Outages greater than 72 hours impacting business continuity

Outage of online CRM system

Effect:

  • Reduced ability to continue sales operations

Solution(s):

  • While there is no current failover plan should our online CRM system become disrupted, we have SLAs with our CRM vendor–which is used by thousands of other organizations–and believe the probability of sustained outage is low.

Priority 4: Outages greater than 10 days impacting business continuity

Outage of online HR and intranet systems

Effect:

  • Reduced ability to continue HR and internal operations

Solution(s):

  • While there is no current failover plan should our online HR or intranet system become disrupted, we have SLAs with our vendors–which is used by thousands of other organizations–and believe the probability of sustained outage is low.