Security at Crowdin
At Crowdin, we’re committed to following industry standards for security, safety, and privacy.
ISO/IEC 27001 certified
EU General Data Protection Regulation (GDPR) compliance
Customers that are subject to HIPAA and want to utilize Crowdin in connection with Protected Health Information (PHI) must sign Crowdin's Business Associate Agreement
Internal Security Measures
Crowdin Information Security Policy requirements apply to the entire Crowdin organization and are mandatory for all employees and those involved in these business processes. ISMS is built on three pillars: people, processes, and technology. A dedicated Chief Information Security Officer (CISO) is responsible for ensuring the proper protection of information assets and technologies.
Security Training and Awareness
At Crowdin, we have All employees complete ongoing security and awareness training throughout the year. Each new team member completes basic security training within the first month of hire. We conduct regular access audits, password updates and operate on the principle of the least privilege. Role-specific security training is also required.
All employee laptops have encrypted hard drives. Only the appointed system administrator only conducts hardware and software installation, configuration, or alteration. Delivery, removal of equipment to/from the data center facility is authorized, logged, and monitored. User-specific access credentials (e.g., user ID/password pair, etc.) are required to access workstation equipment, services, and applications.
Crowdin’s office is monitored and protected by an alarm system and equipped with fire alarm systems. Closed-circuit (CCTV) cameras are installed across the office and capture entrances, exits, and other designated areas. Crowdin employees do not have physical access to any of our production facilities, as our whole infrastructure is in the cloud. Secure areas are protected with entry controls, so only authorized personnel is allowed access.
Our internal network is restricted, segmented, password-protected, and all network security-related events are logged.
Crowdin employs a team of 24/7/365 server specialists to keep our software and its dependencies up to date, removing potential security vulnerabilities. We use monitoring solutions to prevent and eliminate site attacks.
Crowdin implements a protocol for handling security events which includes escalation procedures, rapid mitigation and post mortem. All employees are informed of our policies.
Crowdin performs background checks on all new employees, contractors, or other individuals who have access to systems or the network or physical data center facilities in accordance with local laws.
Third-Party & Supplier Security
Crowdin maintains vendor risk management practices to ensure third parties are scrutinized and maintain expected levels of security controls. View our List of Sub-processors.
Secure, reliable infrastructure
Crowdin uses Amazon Web Services (AWS) data centers for our computing infrastructure. AWS has ISO 27001 certification and has completed multiple SSAE 16 audits. For more information on their security measures, visit AWS Cloud Security page.
In addition to the benefits provided by AWS, our application has additional built-in security features:
- Two-Factor Authentication
- Single Sign-On via SAML 2.0
- REST API Authentication (API Key)
- Role-based permissions
- Backups and versioning
- Crowdin enforces a password complexity standard
When you sign up for a Crowdin’s paid account, we do not store any of your billing information on our servers. All payments made to Crowdin go through our partner, FastSpring. They are compliant with PCI Security Standard. More details about their security setup can be found on Stripe’s Risk Management + Compliance page.
Check our past month stats at https://status.crowdin.com/. You can request an SLA agreement as a separate service, for this contact us at firstname.lastname@example.org
Access to Data
Access to customer data is limited to authorized employees who require it for their job. An example of this is our Support team. The support team representatives may only have access to the files or settings needed to solve issues submitted by customers.
Business Continuity & Disaster Recovery
We have developed, regularly test and update both a Disaster Recovery Plan and a Business Continuity Plan.
Crowdin annually conducts penetration testing by an independent, third-party security audit agency. No customer data is exposed to the agency through pentesting. A summary of penetration test findings is available to enterprise customers upon request.
If you have any questions about security at Crowdin or would like to submit a vulnerability report, please, contact us at email@example.com.
We will work with you to assess the issue and fully address any concerns. Emails about security issues are treated with the highest priority. Safety and security of our service are our top priorities.