Security Practices

This Security Practice was last updated on .

Thousands of users trust Sahara Entertainment with their sensitive and confidential business ideas, business models, and metrics. We take the security of your data very seriously. As transparency is one of the principles on which our company is built, we aim to be as clear and open as we can about the way we handle security.

If you have additional questions regarding security, we are happy to answer them. Please contact us through our contact page and we will respond as quickly as we can.

Confidentiality

We place strict controls over our employees’ access to the data you and your users make available via the Sahara Entertainment services, as more specifically defined in your agreement with Sahara Entertainment covering the use of the Sahara Entertainment services (" User Data"), and are committed to ensuring that User Data is not seen by anyone who should not have access to it. The operation of the Sahara Entertainment services requires that some employees have access to the systems which store and process User Data. For example, in order to diagnose a problem you are having with the Sahara Entertainment services, we may need to access your User Data. These employees are prohibited from using these permissions to view User Data unless it is necessary to do so. We have technical controls and audit policies in place to ensure that any access to User Data is logged.

All of our employees and contract personnel are bound to our policies regarding User Data and we treat these issues as matters of the highest importance within our company.

Personnel Practices

All employees are required to read and agree to company policies covering the security, availability, and confidentiality of the Sahara Entertainment services.

Security Assessments and Compliance

Data Centers

The Sahara Entertainment application is hosted on the Vercel infrastructure. Physical infrastructure is hosted and managed within Amazon’s secure data centers and utilize the Amazon Web Service (AWS) technology. Amazon continually manages risk and undergoes recurring assessments to ensure compliance with industry standards. Amazon’s data center operations have been accredited under:

User Security Best Practices

Single Sign On

Administrators of paid teams can integrate their Sahara Entertainment services instance with a variety of single-sign-on providers.

Data Encryption In Transit and At Rest

The Sahara Entertainment services support HTTPS for applications and SSL database connections to encrypt all traffic in transit. User Data stored within the database is encrypted at rest.

Availability

We understand that you rely on the Sahara Entertainment services to work. We're committed to making Sahara Entertainment a highly-available service that you can count on. Our infrastructure runs on systems that are fault tolerant, for failures of individual servers or even entire data centers.

Disaster Recovery

User Data is stored redundantly at multiple locations in our hosting provider’s data centers to ensure availability. We have well-tested backup and restoration procedures, which allow recovery from a major disaster. User Data and our source code are automatically backed up nightly.

Network Security

Vercel and Amazon use firewalls to restrict access to systems from external networks and between systems internally, provide DDoS mitigation and spoofing/sniffing protections, and prohibit port scanning. For more information, please visit the Vercel website.

In addition to these measures, we have also implemented two-factor authentication for all server access across our production environment.

Vulnerability Management

We perform automated vulnerability scans on our production hosts and remediate any findings that present a risk to our environment. We enforce screens lockouts and the usage of full disk encryption for company laptops. Our application code is audited with automated static analysis software, tested, and manually peer-reviewed prior to being deployed to production. We also employ the use of continuous hybrid automated scanning of our web platform.

Our third party security assessments cover all areas of our platform including testing for OWASP Top 10 web application vulnerabilities and customer application isolation. Issues found in the Sahara Entertainment application are risk ranked, prioritized, assigned to the responsible team for remediation, and we reviews each remediation plan to ensure proper resolution.

Logging

Sahara Entertainment maintains an extensive, centralized logging environment in its production environment which contains information pertaining to security, monitoring, availability, access, and other metrics about the Sahara Entertainment services. These logs are regularly analyzed for security events.