JFrog LogoJFrog Logo
  • Produits
  • Solutions
  • Tarifs
  • Développeurs
  • Ressources
  • Partenaire
  • Devenir Partenaire JFrog>
  • Travailler avec un Partenaire JFrog>
  • Obtenir de l'aide>
  • Communauté>
  • Documentation>
  • Integrations>
  • Applications>
Cas d’utilisation
  • DevOps
    • DevOps Platform
    • Artifact Management
    • CI/CD
    • Tool Consolidation
    • AI/ML Model Management
  • Security
    • Sécurité de la Chaîne d'Approvisionnement de Logiciels
  • IoT
    • Gestion des appareils connectés
Industrie
  • Services financiers>
  • Secteur automobile>
  • Services de santé>
  • Technologie et logiciels>
  • Gaming>
  • Gouvernement>
JFrog Advanced Security

Innovez plus rapidement grâce à une sécurité DevOps avancée pour la chaîne logistique logicielle

En savoir plus
Apprentissage et Guides
  • JFrog Help Center>
  • Académie JFrog>
  • Conseil DevOps>
  • Certification DevOps>
  • Webinaires & Workshops>
  • Que sont les Outils DevOps ?>
Collateral
  • Centre de Ressources>
  • Blog JFrog>
Zone Client
  • Assistance>
    Assistance client, tickets et communauté
  • Gestion et dépannage>
    Renouveler, récupérer des licences, juridique et plus encore
  • MyJFrog>
    Portail client Cloud
  • État du Cloud>
    État du service et abonnement à l’événement
  • JFrog Trust>
    Comment nous vous protégeons vous et vos données
La Plateforme JFrog
Plateforme de chaîne d’approvisionnement logicielle intégrale pour contrôler et sécuriser les pipelines, du développement à l’appareil
En savoir plus
JFrog Artifactory
Gestionnaire universel de dépôts pour les entreprises
Xray Logo
Les bases de
la sécurité JFrog (Xray)
Une SCA moderne pour l’évolution des artefacts logiciels
JFrog Connect
JFrog Connect
Gestion des appareils IoT avec l’agilité DevOps
Xray Logo
JFrog Advanced Security
Scan de l’exposition à la sécurité de la chaîne d’approvisionnement logicielle et analyse d’impact dans le monde réel
JFrog Pipelines
JFrog Pipelines
Universal CI/CD DevOps Pipeline for the enterprise
JFrog Curation
Seamlessly Curate Software Packages Entering Your Organization
Distribution icon
JFrog Distribution
Fiabiliser la Livraison des Logiciels
En De 日本語 简体中文
Démarrer Gratuitement
  • Produits
      • La Plateforme JFrog
        Plateforme de chaîne d’approvisionnement logicielle intégrale pour contrôler et sécuriser les pipelines, du développement à l’appareil
      • JFrog Artifactory
        Gestionnaire universel de dépôts pour les entreprises
      • Les bases de
        la sécurité JFrog (Xray)
        Une SCA moderne pour l’évolution des artefacts logiciels
      • JFrog Connect
        Gestion des appareils IoT avec l’agilité DevOps
      • JFrog Advanced Security
        Scan de l’exposition à la sécurité de la chaîne d’approvisionnement logicielle et analyse d’impact dans le monde réel
      • JFrog Pipelines
        Universal CI/CD DevOps Pipeline for the enterprise
      • JFrog Curation
        Seamlessly Curate Software Packages Entering Your Organization
      • JFrog Distribution
        Fiabiliser la Livraison des Logiciels
  • Solutions
    • Cas d’utilisation
      • DevOps
        • DevOps Platform
        • Artifact Management
        • CI/CD
        • Tool Consolidation
        • AI/ML Model Management
      • Security
        • Sécurité de la Chaîne d'Approvisionnement de Logiciels
      • IoT
        • Gestion des appareils connectés
    • Industrie
      • Services financiers
      • Secteur automobile
      • Services de santé
      • Technologie et logiciels
      • Gaming
      • Gouvernement
    • Tarifs
    • Développeurs
        • Communauté
        • Documentation
        • Integrations
        • Applications
      • Ressources
        • Apprentissage et Guides
          • JFrog Help Center
          • Académie JFrog
          • Conseil DevOps
          • Certification DevOps
          • Webinaires & Workshops
          • Que sont les Outils DevOps ?
        • Collateral
          • Centre de Ressources
          • Blog JFrog
        • Zone Client
          • Assistance
            Assistance client, tickets et communauté
          • Gestion et dépannage
            Renouveler, récupérer des licences, juridique et plus encore
          • MyJFrog
            Portail client Cloud
          • État du Cloud
            État du service et abonnement à l’événement
          • JFrog Trust
            Comment nous vous protégeons vous et vos données
        • Partenaire
            • Devenir Partenaire JFrog
            • Travailler avec un Partenaire JFrog
            • Obtenir de l'aide
          • Self Hosted Terms and Conditions
            • 企业+边缘分布Addendum
          • Cloud Terms and Conditions
          • Support
          • Privacy and Security
            • JFrog Trust Center
            • JFrog Privacy Center
            • Politique de confidentialité de JFrog

          JFrog Technical and Organizational Measures

          Last Updated: August 16, 2023

          JFrog will maintain the following Technical and Organizational Measures (TOMs):

          Application and Infrastructure Control
          • JFrog’s Cyber Incident Response Team (CIRT)不断监视我们的产品,基础设施hth华体会最新官方网站operations and security solutions. JFrog’s security team has established a comprehensive strategy and policies to respond, notify, and remediate security incidents promptly and efficiently.
          • JFrog’s CIRT continuously monitors our products’ logs, infrastructure operations and systems audit logs in our internal Security Information and Event Management (SIEM) to detect potential incidents promptly and efficiently. As part of this ongoing effort, the CIRT investigates and responds to reports from bug bounty programs, vulnerability disclosure programs, automated scanners, customer support portal and dedicated email inbox.
          • To ensure prompt and efficient response time, our Security Operations Center (SOC) is staffed with highly qualified and experienced security experts, who work to fulfill our internal SLA policy.
          Internal Controls
          • JFrog has defined access roles for each system and service based on least privilege principle. Access to all our applications is possible only via Single Sign-on (SSO) and 2-factor authentication (2FA) with strong password policies.
          • JFrog requires that its employees use a password manager to ensure that they use unique and complex passwords and store them in a secure vault.
          • JFrog uses a zero-trust solution to securely connect our employees, devices, and apps over JFrog’s internal network. Our zero-trust solution provides Web and URL filtering, sandboxing, cloud firewall, CASB and DLP.
          • JFrog engineers connect to our production resources using an advanced 2FA and just-in-time access solution, which allows us to employ the principle of least privilege and conduct a full audit.
          • JFrog laptops are equipped with encryption technology that is turned on by default, along with advanced anti-malware software.
          • JFrog uses email protection solutions designed to prevent malware, zero-day attacks, phishing, Business Email Compromise (BEC), spam and N-days.
          • JFrog employees receive mandatory data protection and cyber security awareness training as part of their onboarding, as well as ongoing training thereafter. Moreover, employees receive ongoing security education training about topics such as phishing, password management, secure development, and security best practices for operating cloud accounts.
          Security Events
          • JFrog’s CIRT works with external incident response experts to assist JFrog with emergency security incidents. As part of JFrog’s comprehensive vulnerability management process, JFrog’s CIRT runs continuous and automated vulnerability scans of all our assets; prioritizes vulnerability fixes and releases patches quickly.
          Certificate Program
          • JFrog is certified underISO 27001, the global standard for IT security management policies. ISO 27001 is a framework for Information Security Management Systems (ISMS) that enables the continued confidentiality, integrity and availability of information, which includes people, processes, and IT systems, its objective is to provide requirements for establishing, implementing, maintaining, and continuously improving an ISMS.
          • JFrog is certified underISO 27701, the data privacy extension to ISO 27001/2. This Privacy Information Management System (PIMS) outlines a framework for Personally Identifiable Information (PII) Controllers and PII Processors to manage privacy controls and to reduce the risk to the privacy rights of individuals.
          • JFrog engages Ernst & Young to audit its System and Organization Controls Report –SOC 2 Type II Report. This auditing procedure ensures we securely manage and protect our customer’s data. This Report is validated and updated annually and is a key document that outlines and certifies the ways in which JFrog achieves and maintains compliance and control objectives.

          The following TOMs apply only to JFrog Cloud Subscriptions:

          Access Control
          • Each cloud customer account is (i) deployed with a unique ID to guarantee adequate separation; (ii) granted its own unique and narrow role, based on least privilege principle. Permissions are granted as required to perform tasks and access shared resources, such as databases and cloud object storage.
          • The default and automatic deployment of the JFrog Platform is on a shared environment including the following resources:
            • The load balancer is a shared component at the region level;
            • The applications’ database schema and role are dedicated for each customer.
            • The applications’ database and file store are deployed using a cloud provider managed service, shared at the region level;
            • Each customer has its own unique role with permissions for their own files.
          • JFrog Platform uses managed object storage and databases from the major cloud providers.
          Data Encryption
          • Data in transit is defined as data that is actively transferring between different destinations (e.g., applications to databases or object storage) over the same network or over the internet. In the JFrog Platform, Customer Data is encrypted in transit using HTTPS with TLS V1.2.
          • Data at rest is defined as data that is physically stored and hosted in any digital form (e.g., cloud storage, databases, data warehouses, or cloud backups) and not actively transferring between different destinations. In the JFrog Platform, all hosted data at rest is securely stored in a database and object storage using 256-bit AES encryption.
          Application and Infrastructure Control
          • As part of our multi-layer cloud protection approach, a dedicated DDoS mitigation ecosystem has been put in place. JFrog utilizes anti-DDoS protection, a next-gen WAF, an API protection tool, advanced rate limiting and bot protection
          Network Control
          • JFrog has appropriate network perimeter defense solutions in place, to monitor, detect, and prevent malicious network activity and restrict access to authorized users and services.
          Backup
          • th JFrog维护一个内部备份解决方案e Artifactory instance, by replicating the storage and database to a different region in the same continent. For the removal of doubt, the purpose of such backup is solely to ensure JFrog’s continuous ability to provide use of the JFrog Platform and is not intended for the restoration of Customer Data upon Customer request.
          Business Continuity Plan and Disaster Recovery Plan
          • JFrog maintains a Business Continuity Plan (BCP) and a Disaster Recovery Plan (DRP) consistent with industry best practices for the JFrog Platform, which is tested annually. In addition, the BCP and DRP will ensure: (i) installed systems used to provide the JFrog Platform will be restored in case of interruption; (ii) JFrog’s ability to restore the availability and access to the Customer Data in a timely manner in the event of a physical or technical incident; and (iii) the ongoing confidentiality, integrity, availability, and resilience of systems JFrog uses to provide the JFrog Platform.
          Certificate Program
          • JFrog is certified underISO 27017, the global security standard for cloud service providers and users. ISO 27017 provides guidance on the information security aspects of cloud computing, to make a safer cloud-based environment and reduce the risk of security issues.
          Produits
          • Artifactory
          • Xray
          • Conservation
          • Pipelines
          • Distribution
          • 容器注册表
          • Connect
          • JFrog Platform
          • Démarrer Gratuitement
          Ressources
          • Blog
          • Événements
          • Intégrations
          • JFrog Help Center
          • Outils DevOps
          • Open Source
          • En vedette
          • JFrog Trust
          • Compare JFrog
          Entreprise
          • À propos de nous
          • Gouvernance
          • Relations avec les investisseurs
          • Partenaires
          • Clients
          • Carrières
          • Presse
          • Contactez-nous
          • Identité de marque
          Communauté
          • Community
          • Downloads
          • Community Events
          • Open Source Foundations
          • Forum communautaire
          • Superfrogs
          • Applications
          lang-switcherFrarrow
          • En
          • Fr
          • De
          • 日本語
          • 简体中文
          Follow Us
          © 2023 JFrog Ltd Tous droits réservés
          JFrog Logo
          Conditions Générales de Service | Cookies Policy | Politique de Confidentialité |
          Cookies Settings
          | Accessibility Mode

          Succès

          Votre action a été une réussite

          Oups...Quelque chose s'est mal passé

          Veuillez réessayer plus tard

          Informations

          frog hand

          Message modal