Appfire security advisory on Snowflake Breach - Account Compromise

Trust Center

Start your security review
View & download sensitive information
Ask for information
Search items
ControlK

The Appfire Trust Center connects you to the latest information on the security, privacy, and compliance of our uniquely positioned products and services, to give you the comfort and trust you need when buying and using any Appfire app.

Appfire is certified under ISO 27001 and ISO 27017, and have also completed our SOC 2 audits.

Requesting full access will give you access to NDA protected content. Subscribing will provide you with notifications of future updates.

Start your security review
View & download sensitive information
Ask for information
Pentest Report

Trust Center Updates

Appfire security advisory on Snowflake Breach - Account Compromise

IncidentsCopy link

Background

Snowflake is a database vendor used by Appfire for data insights and analytics. It is not used by any of our marketplace applications. Snowflake has an ongoing investigation involving a targeted threat campaign against some Snowflake customer accounts. The initial attack methods revolves around compromise of user accounts that are not secured by MFA or other restricted access methods. According to Snowflake this compromise is not due to a vulnerability in Snowflake’s cloud offering.

Appfire Evaluation

Appfire is not impacted by this breach. As of this writing, Snowflake has stated that there was no breach of their systems nor exploitable vulnerability in their products. Regardless, our information security teams reviewed the controls in place around our instances of Snowflake, and reviewed logs against the indicators of compromise that were shared by Snowflake. We confirmed that none of the recently disclosed events impacted Appfire or our usage of Snowflake. If you would like more information about Snowflake's response to these recent events, please refer to their web site and community forum.

Published at N/A

Appfire SOC 2, Type II Audit Completed!

ComplianceCopy link

🔒 We’re proud to share some exciting news… Appfire hasc ompleted our SOC 2, Type II audit!

As we continue to prioritize the security of our technology, this latest recognition further demonstrates Appfire’s commitment to security and compliance for our customers, prospects, partners, and team members.

Learn more: https://bit.ly/3SJJN3z

Get it here: https://trust.appfire.com/?itemUid=7bfa66da-33ab-49de-8391-e329738a1ae9&source=click

Published at N/A

Appfire 2024 CAIQ-Lite & SIG-Lite released

ComplianceCopy link

Hi all,

Appfire is happy to announce we have released our updated 2024 CAIQ-Lite and SIG-Lite questionnaires. We've made a lot of improvements in the last year, including obtaining ISO 27001 and ISO 27017 certifications and completing SOC 2 audits, and these changes are now reflected in our questionnaires.

CAIQ-Lite

SIG-Lite

On a separate note, we have completed our new SOC 2, Type II audit and are expecting the final report any day. Our results were excellent and we'll send out an update on the Trust Center once it is available.

In addition, we are actively working on our penetration tests and have been updating new test results on an ongoing basis. In 2024 we've decided to test all of our apps twice a year vs. annual testing. This has resulted in Appfire bringing on a new vendor who can support the volume since we will be testing hundreds of apps every 6 months. Thank you for your patience as we roll this out. If you have a specific app or apps you would like us to prioritize, please reach out.

Thanks again for your trust,

Douglas J. Kersten CISO Appfire

Published at N/A

Appfire Security Advisory CVE-2023-22515

IncidentsCopy link

Broken access control vulnerability in Confluence Data Center and Server

Background Atlassian has released a critical security advisory regarding CVE-2023-22515 - Broken Access Control Vulnerability in Confluence Data Center and Server. This note summarizes how this vulnerability affects Appfire applications, systems, and data and what mitigation steps Appfire is undertaking to minimize the impact.

Appfire applications affected by CVE-2023-22515 No Appfire applications are directly affected by, or contribute to the likelihood or impact of, this vulnerability. The risk is confined to the underlying Confluence Data Center and Server instances and their installed apps. The risk remains the same, regardless of which Appfire applications are installed. Since it is an elevation of privilege vulnerability, it is possible for adversaries to create admin-level accounts in Confluence that will allow them full access to install or remove all marketplace apps, as well as allow access to the administrative functions of any installed apps in the affected instance of Confluence.
Appfire corporate Confluence sites affected by CVE-2023-22515 All Appfire Confluence DC and Server sites have been evaluated and any identified risks mitigated.

CVSS 10: URGENT ACTION REQUIRED Clients running affected Confluence Server or Data Center are advised to urgently upgrade to a non-vulnerable version of Confluence Data Center or Server. Furthermore, investigate if escalated privilege or suspicious accounts have been created and used

References: Atlassian Security Advisory for CVE-2023-22515 Atlassian security advisories

Published at N/A

Appfire is Not Affected by MOVEit Vulnerabilities (CVE-2023-35708)

IncidentsCopy link

Appfire is Not Affected by MOVEit Vulnerabilities (CVE-2023-35708)

Our security team has recently been made aware of a notable vulnerability associated with the MOVEit application from Progress Software. After an extensive review, we have determined that our products and corporate infrastructure do not use or incorporate the affected technology/software.

Published at N/A

Appfire Sub-processor List Updated - 6-9-2023

SubprocessorsCopy link

Hi all,

Appfire has updated our Sub-processors' list as of June 9, 2023. Please, see the updated list on our Trust Center.

Thank you,

Appfire Legal Team

Published at N/A

Appfire Penetration Testing Attestation Letters Released

ComplianceCopy link

Hi all,

A typo in the link provided in the last update was brought to our attention.

Please use the link below to access Appfire's Attestation Letters:

Appfire Attestation Letters

Best Regards,

  • The Appfire Security Team
Published at N/A

Appfire has released 2022 penetration test attestation letters for its cloud based products and corporate domains. Appfire addresses all critical, high and medium findings identified during penetration testing.

Click here: Appfire Attestation Letters

Appfire is committed to maintaining a strong security posture to offer our customers peace of mind. Penetration testing is just one of the tools that we use to accomplish this. Our mission is to make sure you feel secure buying and using any of our products and services.

Thank you for being our customer and partner.

  • The Appfire Security Team
Published at N/A*

Welcome to the Appfire's Security, Privacy & Compliance Trust Center

GeneralCopy link

As an organization that is security and privacy conscious, we are excited to announce the official launch of the Appfire's Security, Privacy & Compliance Trust Center. By using this portal, you can request access to our compliance documents, review our standardized questionnaires such as the CAIQ-Lite and gain a general understanding of our security and privacy posture.

Over time, our team will be making changes to this portal as we implement new tools and processes in our environment. You can use the Subscribe button to receive email notifications for when our team has an important update, such as if we have an updated compliance report or if we have a status update regarding a major security vulnerability that has been recently discovered.

-The Appfire Security & Privacy Team

Published at N/A

If you need help using this Trust Center, please contact us.

If you think you may have discovered a vulnerability, please send us a note.

Powered bySafeBase Logo