Security

Last Updated: May 23, 2019

You are Safe with Bunkor

We take privacy and data security seriously. That’s why we’re committed to protecting your information using the highest standards of security available. Working with Bunkor gives you total peace of mind.

Secure Data Transmission and Storage
We protect your data with 256-bit SSL/TLS encryption. That’s the same level of encryption used by banks, so your account information with Bunkor is always protected.

Background Checks
Everyone at Bunkor goes through a rigorous screening process, including multiple interviews and a criminal record check.

Canadian Corporation
We are a Canadian Corporation, and all bookkeeping is done by bookkeepers trained to protect customer data.

Bunkor prides itself on placing a priority on security so that we can safely deliver results fast that are enjoyable to our customers. We have enacted several types of security procedures around our product, the making of it, and how we handle data that is produced.  Security at Bunkor ensures that our customers are safe and secure when using our Service.

Contacting Bunkor About Security

We ask that all security concerns, questions, and comments be directed through our main support channel via the contact form on our site. Tickets categorized as security-related are triaged and remediated in an expedient manner.  Our security team will be notified of the ticket and may respond directly with the person who contacted us.

Security Architecture

All Bunkor systems are built with a defense-first approach, assuming that an attack can happen at any time. While our process ideally prevents attacks, we also work to mitigate the damage of an attack by separating systems from each other. Systems only contain the software for a single application (so-called “single-use systems”) and never share the same system for different types of software.

Our systems are stateless and short-lived. All data on a system is intended to be sent to another system, and the system itself is not intended to be in operation for more than a week at a time (see Release Management for more detail). Our systems are also immutable, ensuring that neither the system configuration nor software installed on it are changed after the system has been put into operation. This ensures that we can quickly monitor system events for security incidents.

Network Protection

All Bunkor servers are hosted inside a private virtual network within Amazon Web Services, which ensures communication between Bunkor servers remains encrypted and separated from public Internet traffic. Communication between servers over external (or public) networks is always encrypted with industry-standard SSL.

Servers are only allowed to accept network communications on approved ports. All servers utilize a firewall to limit what incoming and outgoing connections they accept. Our servers have a “default deny” policy in place for any network communications.

Where possible, two-factor authentication and strong passwords are enforced when system or console access is required. This policy ensures that access to such systems are increasingly difficult to attack.

Logging and Monitoring

All systems write log data to a centralized logging storage system that utilizes a write-only policy. Log data cannot be altered or deleted in the log system. This log data is available for 1 year as per PCI compliance policies.

All systems generate events to a third-party service in a write-only event stream. This ensures that our applications and servers can be monitored without accessing systems, and ensures that our event data cannot be tampered with.

Data Resource Isolation

Bunkor is a multi-tenant platform, where customer data is logically separated by a unique identifier and access control is strongly enforced at the application level. Permissions follow a least privilege process where explicit access to resources must be granted.

Since Bunkor uses AWS for its infrastructure, each server is by default denied access to all other AWS resources unless explicitly approved. One environment cannot read from another environment. This is made available through extensive use of IAM policies with whitelisted permissions.

Service Providers

Bunkor hosts all application services on Amazon Web Services (AWS). In addition, a Level 1 PCI-DSS compliant payment processor is used for handling credit card payments. Full credit card data passes between the customer browser and the payment processor, and is never sent to or accessible by Bunkor.

Log data, which may contain sensitive information but not payment information, is stored with a third-party, centralized append-only log storage company. Only approved employees have access to logging data, for troubleshooting or auditing purposes.

All services providers are expected to be PCI compliant before the tendering process completes and their services are put into use.

Disaster Recovery

Our servers are from multiple countries to ensure that the loss of a major network zone (i.e. country) does not adversely impact the availability of the pages. All network communication will automatically route to the nearest usable server.

Our servers are expected to be short-lived and fail at any time, allowing us to create measures to restore the entire system based on the last known good configuration used.

The software installed on our systems can be deployed or rolled back quickly without noticeable downtime. Software artifacts are versioned and resist accidental or malicious tampering or deletion.

Customer data is backed up daily. Those backups are regularly tested to verify that the backup is valid.

Nobody can be fully prepared for a disaster, but a best effort is made to prevent most events. As such, Bunkor is always looking for ways to improve its disaster recovery operations. We believe that, through continuous improvement processes we can attain a high degree of disaster recovery preparedness. Our risk assessments and disaster recovery processes are reviewed regularly for improvements. All new services are expected to pass fault tolerance and recovery tests before they are put into live operation.

Compliance Concerns

Bunkor maintains the following compliance for its service:

  • PCI: Bunkor is a PCI Level 4 Merchant and has successfully completed all SAQ A-EP requirements. We process your credit card with a third party payment processor, and neither store nor access your full credit card details. PCI compliance helps customers understand that there are policies and procedures in place to securely process credit card data in our systems.  This includes over 100 controls to secure, monitor, and audit our systems to prevent unauthorized access and tampering.

Any compliance certification not listed here is assumed to not be present or in use at Bunkor.

EU data privacy and the compliance controls around it are still a dynamic situation.  Bunkor is actively monitoring the legislative and regulatory efforts surrounding EU data privacy that are being ratified, and will comply with those controls as required by law.

Data Access

Policies and procedures are enforced so that only authorized employees are allowed to access customer data and other non-public data maintained at Bunkor.  Authorization is granted on a case-by-case basis based on business need.  Access is revoked immediately in the event that an employee no longer has a business need to access data or in the event of termination.

Data Security at Rest

In accordance with our information security policy, all data is classified into levels that dictate their encryption requirements. The most sensitive data is always encrypted at rest and access it limited to authorized users with a business need.

Data Security in Transit

Access to the Bunkor app always uses industry-standard SSL to secure the connection between your browser and our services. At no time is payment card data submitted through insecure communication methods.

Inter-system communication is always encrypted. This applies to communication between internal systems (Bunkor-managed) or external systems (Bunkor.communicating with other companies).

External Security Audits

We perform external penetration tests against our application to ensure that our security practices are providing a benefit to the security of our customers. The penetration tests are performed by an unbiased third-party security firm.

Any security audits, scans, or penetration tests that are not explicitly approved by Bunkor are prohibited as part of our Acceptable Use Policy.  This applies to all systems and services managed by Bunkor.  Persons running scans may be discoverable, in this case we will contact you directly and ask that you stop any further actions before pursuing legal options.  This is because any unapproved scans may result in having the source IP address(es) banned to protect our systems and interfere with the service availability for other customers.

Incident Management / Response

All systems fail. At Bunkor, we pride ourselves on expecting this eventuality and ensuring that the impact of the failure is minimized. We value our incident response skills on the ability to act quickly to recover from failure.

Our employees follow incident response procedures carefully, and promote honest feedback sessions (post mortems) to learn why systems fail and how to prevent it from happening in the future.

Data Retention Policy

Customer data can only be deleted by the customer or with the customer’s request. Data is removed from the system via a soft delete, a flag that renders the data invisible to the application, but otherwise retains the data in the database in the event it needs to be restored.

Data is also retained in backups as part of disaster recovery operations. If data is purged (hard deleted) from any system, it will remain in our backups for a short period of time (approximately 2 weeks).

Logs are kept for one year and may contain information that uniquely identifies customer data within our system. This log information is used for auditing and troubleshooting.

Bug Bounties and Other Programs

Bunkor does not currently have a formal bug bounty for security researchers, nor does it participate in any other bounty programs.  We are evaluating possible programs but, as of this writing, nothing is currently available and any situation is dealt with on a case-by-case basis.  We would love to provide any security researcher with swag and other items as a token of our gratitude for helping to keep our systems and our customers safe.

Information Security / Development Process

Information security forms the basis which ensures that customer data is properly handled when passed between systems, either internally (between Bunkor services) or externally (between Bunkor and the customer). All external sources of data is untrusted until it is verified.

All changes to the Bunkor app (app.Bunkor.com) are scanned for outdated/insecure libraries and insecure code. Our live environment is scanned continuously for standard security failures (OWASP Top 10) and issues are remediated quickly.

Development Lifecycle / Release Management

All software changes are peer-reviewed and tested before being released to the public. All infrastructure changes are also stored as code, so that it can be reviewed and tested prior to release. Our release management process of each service revolves around immutable architecture. Each new version of code is built on top of a brand-new fully-patched set of servers and infrastructure. If a fault is found within the new version of code, the servers are destroyed. Once software is live in a server, neither the software nor the server is modified from that point onward.

New software is released on an as-needed basis, often multiple times per day. We believe that making small changes helps to prevent failures and promote a faster recovery time in the event a failure occurs.

Common Security Vulnerabilities

SQL and Other Injection Techniques

All input from customers or any external system is considered untrusted, and must pass a whitelist before being inserted into a database or other system. Our application also sanitises output from the database to prevent accidental insertion of SQL injection data from being displayed to customers.

Cross Site Scripting

All input data from users is escaped to prevent XSS exploits. We also continuously run automated security scanners targeting this specific vulnerability.

Authentication / Session Management

All authentication credentials are forced to transmit in an encrypted manner over SSL, and cookies are only accessible securely.

Cross-Site Request Forgery

CSRF tokens are required on all forms in Bunkor’s app. This prevention is audited by an automated scanner that targets this specific vulnerability.

Security Configuration Management

Bunkor systems are updated regularly to use the latest patches and code for the OS and vendor software. All systems undergo security hardening procedures. All system configuration is stored as code and peer-reviewed before being put into live operation.

Cryptographic Key Management

Bunkor hashes all passwords using bcrypt with a higher than average work factor to thwart brute-force attacks. At no time can an Bunkor employee access a customer password.

Transport Layer Protection

All communication between the customer browser and the Bunkor app (app.Bunkor.com) is encrypted using industry-standard SSL. We regularly review the cipher suites and protocols used in the SSL communication, so older browsers may stop working. This is to ensure that attackers cannot downgrade SSL communications by using an obsolete or insecure cipher suite.

All form submissions will be transmitted securely via SSL. Bunkor advises customers to use SSL whenever possible to avoid transmission of unencrypted data over open networks.