{"id":96010,"date":"2022-06-21T10:13:12","date_gmt":"2022-06-21T08:13:12","guid":{"rendered":"https:\/\/jfrog.com\/?page_id=96010"},"modified":"2024-08-09T09:42:06","modified_gmt":"2024-08-09T07:42:06","slug":"jfrog-toms","status":"publish","type":"page","link":"https:\/\/jfrog.com\/de\/jfrog-toms\/","title":{"rendered":"JFrog Cloud Data Security Addendum"},"content":{"rendered":"<p>Last Updated: August 01, 2024<\/p>\n<p>This JFrog Cloud Data Security Addendum (\u201c<b>DSA<\/b>\u201d or \u201c<b>TOMs<\/b>\u201d) describes the technical and organizational security measures (TOMs) that JFrog maintains to protect Customer Data (including Personal Data, as applicable) and Confidential Information. JFrog reserves the right to update the DSA, at its sole discretion, where updates will not materially degrade the security protocols or security levels in place as of the Effective Date during the applicable Subscription Term. Changes will be reflected at <a href=\"https:\/\/jfrog.com\/jfrog-toms\">https:\/\/jfrog.com\/jfrog-toms<\/a>. This DSA forms part of the JFrog Agreement between JFrog and Customer and applies to Self-Hosted Subscriptions as applicable. Any capitalized terms which are not defined herein, shall have the meaning provided to them in the Agreement or the DPA.<\/p>\n<ol>\n<li><span style=\"color: #40be46;\"><b>JFrog Security Program<\/b><\/span><br \/>\nJFrog has implemented and maintains appropriate administrative, technical, physical, and organizational measures to ensure a level of security appropriate to the level of risk, in accordance with industry standards. JFrog maintains security policies, standards, and controls related to security, confidentiality, integrity, and availability. These policies are reviewed and approved annually and updated as needed.<\/li>\n<li><span style=\"color: #40be46;\"><b>Certificate Program \/ Security Certifications<\/b><\/span><br \/>\nJFrog maintains the following certifications and governance methods:<\/p>\n<ol>\n<li>Certification under ISO\/IEC 27001:2013, ISO\/IEC 27701:2019, ISO 27017:2014, and SOC 2, Type 2.<\/li>\n<li>Annual security audits by an independent third party, covering security, confidentiality, and availability control criteria.<\/li>\n<li>Regularly tests and monitors the effectiveness of its information security program through internal audits aligned with the relevant compliance controls and frameworks. Issues identified are documented, tracked, and remediated as appropriate.<\/li>\n<\/ol>\n<\/li>\n<li><span style=\"color: #40be46;\"><b>Access and Authentication Controls<\/b><\/span><br \/>\nJFrog has implemented and maintains the following measures:<\/p>\n<ol>\n<li>Access Control Policy in accordance with the \u201cleast privileges\u201d and \u201cneed to know\u201d principles.<\/li>\n<li>Strict role-based permissions are granted in accordance with the role requirements.<\/li>\n<li>Access permissions are reviewed on a regular basis. Any access which is inappropriate for a role function is promptly removed.<\/li>\n<li>Access to JFrog systems and networks are disabled promptly upon notification in the event of termination of personnel.<\/li>\n<li>Unique usernames and passwords with minimum length and complexity requirements are enforced for all users.<\/li>\n<li>Two-factor authentication (2FA) is required for remote access and privileged account access.<\/li>\n<li>Physical access to JFrog facilities is restricted and requires a key-card, access is logged and maintained. Visitors are accompanied at all times and confidentiality measures are in place. Additional measures include video surveillance and other industry-standard practices.<\/li>\n<li>Services operate on a multitenant architecture designed to segregate and restrict access to Customer Data hosted on the JFrog platform. JFrog architecture provides a logical data separation for each different Customer via a unique ID.<\/li>\n<\/ol>\n<\/li>\n<li><span style=\"color: #40be46;\"><b>HR, Security, Training and Awareness<\/b><\/span><br \/>\nJFrog has implemented and maintains the following measures:<\/p>\n<ol>\n<li>Background checks are conducted commensurate with job duties, in accordance with applicable laws and regulations.<\/li>\n<li>Personnel are subjected to non-disclosure or confidentiality obligations.<\/li>\n<li>Personnel are required to complete security awareness and privacy training during onboarding and at least annually thereafter.<\/li>\n<li>Personnel are required to review and acknowledge security policies during onboarding and annually thereafter.<\/li>\n<li>Periodic security and privacy awareness campaigns aimed to further educate personnel about their responsibilities.<\/li>\n<\/ol>\n<\/li>\n<li><span style=\"color: #40be46;\"><b>Risk Management and Infrastructure Control<\/b><\/span><br \/>\nJFrog has implemented and maintains the following measures:<\/p>\n<ol>\n<li>JFrog Management reviews documented risks to determine appropriate risk levels and treatment options.<\/li>\n<li>Encryption and Key Management: Industry-standard encryption techniques (TLS 1.2 for data in transit and 256-bit AES for data at rest). Encryption keys are managed in a cloud-hosted key management service (KMS).<\/li>\n<li>Threat and Vulnerability Management: Continuous monitoring, annual penetration tests, and ongoing vulnerability scans are performed to identify and remediate potential threats. Patches are applied regularly after testing for safety. Vulnerabilities are classified based on the Common Vulnerability Scoring System (CVSS), a remediation plan is developed, including the steps required to address the vulnerability and the timeline for completion based on the remediation time for each severity level.<\/li>\n<li>Logging and Monitoring: Monitoring tools and services are used to monitor systems for various events. Logs are stored securely and reviewed by the security team utilizing Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) technology.<\/li>\n<li>Network Security: Zero-Trust Security Technology to prevent unauthorized access to JFrog networks, servers, or applications.<\/li>\n<li>Cloud Security: Utilization of cloud provider-managed DDoS mitigation services, next-generation Web Application Firewall (WAF), API protection, advanced rate limiting, and bot protection. These measures are designed to safeguard against various types of cyber threats. Regular cloud security scanning tools are employed, including advanced Cloud Security Posture Management (CSPM) solutions, to enforce security best practices and mitigate potential misconfigurations.<\/li>\n<li>Development Security: Software Development Life Cycle (SDLC) methodology governs the acquisition, development, implementation, and management of software components. JFrog follows OWASP (Open Web Application Security Project) guidelines to ensure that security is integrated throughout the development process.<\/li>\n<li>Infrastructure as Code: Infrastructure as Code (IaC) serves as a critical component aligning DevOps, Security, and compliance efforts within JFrog&#8217;s operational framework. This approach ensures secure management of infrastructure processes by automating and standardizing deployments. JFrog\u2019s application images undergo rigorous hardening using secured base images and deployment configurations. Continuous security scanning through JFrog\u2019s Xray during the CI build process further enhances security measures.<\/li>\n<\/ol>\n<\/li>\n<li><span style=\"color: #40be46;\"><b>Incident Response<\/b><\/span><br \/>\nJFrog maintains an Incident Response Plan and computer incident response team (CIRT) to respond to Security Incidents. The plan is reviewed at least annually. Affected Customers will be notified in accordance with the applicable Security Incident section in the Agreement or DPA.<\/li>\n<li><span style=\"color: #40be46;\"><b>Third-Party Risk Management<\/b><\/span><br \/>\nJFrog has implemented and maintains the following measures:<\/p>\n<ol>\n<li>JFrog conducts security due diligence and risk assessments of Third Parties.<\/li>\n<li>Periodic audits validate the ongoing governance of control operations and risk.<\/li>\n<li>Security controls and obligations are incorporated into Third Party contracts.<\/li>\n<li>Data Center Security: JFrog Data Centers are hosted by Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) which offer robust data center security measures. These include physical security with 24\/7 staff and access control, advanced environmental controls, extensive network security, and compliance with standards like ISO\/IEC 27001:2013 and SOC 2 Type II. Data centers are designed for high availability with redundancy and failover capabilities, and data is encrypted both at rest and in transit to ensure protection against unauthorized access.<\/li>\n<\/ol>\n<\/li>\n<li><span style=\"color: #40be46;\"><b>Customer Security Considerations<\/b><\/span><br \/>\nCustomers are responsible for their own security measures, including secure password practices, user management, timely software updates (outside of JFrog cloud), and proper access controls. JFrog is not liable for security incidents or data losses resulting from client-side vulnerabilities. JFrog maintains an inventory of infrastructure assets and has documented data disposal policies. Customer Data will be securely deleted as referenced in the Agreement.<\/li>\n<li><span style=\"color: #40be46;\"><b>Contingency Planning<\/b><\/span><br \/>\nJFrog has implemented and maintains the following measures:<\/p>\n<ol>\n<li>A Business Continuity Plan (BCP) and a Disaster Recovery Plan (DRP), which are reviewed annually, to manage significant disruptions.<\/li>\n<li>Data backup, replication, and recovery systems are deployed to support resilience.<\/li>\n<li>Annual Disaster Recovery drills are conducted to test and validate JFrog recovery procedures.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Last Updated: August 01, 2024 This JFrog Cloud Data Security Addendum (\u201cDSA\u201d or \u201cTOMs\u201d) describes the technical and organizational security measures (TOMs) that JFrog maintains to protect Customer Data (including Personal Data, as applicable) and Confidential Information. JFrog reserves the right to update the DSA, at its sole discretion, where updates will not materially degrade &hellip;<\/p>\n","protected":false},"author":398,"featured_media":0,"parent":0,"menu_order":1088,"comment_status":"closed","ping_status":"closed","template":"templates\/legal-page.php","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-96010","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.6 (Yoast SEO v22.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>JFrog Cloud Data Security Addendum | JFrog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/pages\/96010\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"JFrog Cloud Data Security Addendum\" \/>\n<meta property=\"og:description\" content=\"Last Updated: August 01, 2024 This JFrog Cloud Data Security Addendum (\u201cDSA\u201d or \u201cTOMs\u201d) describes the technical and organizational security measures (TOMs) that JFrog maintains to protect Customer Data (including Personal Data, as applicable) and Confidential Information. JFrog reserves the right to update the DSA, at its sole discretion, where updates will not materially degrade &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jfrog.com\/de\/jfrog-toms\/\" \/>\n<meta property=\"og:site_name\" content=\"JFrog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/artifrog\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-09T07:42:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2018\/06\/20132021\/JFROG.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@jfrog\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jfrog.com\/de\/jfrog-toms\/\",\"url\":\"https:\/\/jfrog.com\/de\/jfrog-toms\/\",\"name\":\"JFrog Cloud Data Security Addendum | JFrog\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/de\/#website\"},\"datePublished\":\"2022-06-21T08:13:12+00:00\",\"dateModified\":\"2024-08-09T07:42:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jfrog.com\/de\/jfrog-toms\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jfrog.com\/de\/jfrog-toms\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jfrog.com\/de\/jfrog-toms\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jfrog.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"JFrog Cloud Data Security Addendum\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jfrog.com\/de\/#website\",\"url\":\"https:\/\/jfrog.com\/de\/\",\"name\":\"JFrog\",\"description\":\"Deliver Trusted Software Releases at Speed and Scale\",\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jfrog.com\/de\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jfrog.com\/de\/#organization\",\"name\":\"JFrog\",\"url\":\"https:\/\/jfrog.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"width\":74,\"height\":73,\"caption\":\"JFrog\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/artifrog\",\"https:\/\/x.com\/jfrog\",\"https:\/\/www.linkedin.com\/company\/455737\",\"https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg\",\"https:\/\/www.wikidata.org\/wiki\/Q98608948\"],\"description\":\"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.\",\"legalName\":\"Jfrog, Inc.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"JFrog Cloud Data Security Addendum | JFrog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/pages\/96010","og_locale":"de_DE","og_type":"article","og_title":"JFrog Cloud Data Security Addendum","og_description":"Last Updated: August 01, 2024 This JFrog Cloud Data Security Addendum (\u201cDSA\u201d or \u201cTOMs\u201d) describes the technical and organizational security measures (TOMs) that JFrog maintains to protect Customer Data (including Personal Data, as applicable) and Confidential Information. JFrog reserves the right to update the DSA, at its sole discretion, where updates will not materially degrade &hellip;","og_url":"https:\/\/jfrog.com\/de\/jfrog-toms\/","og_site_name":"JFrog","article_publisher":"https:\/\/www.facebook.com\/artifrog","article_modified_time":"2024-08-09T07:42:06+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2018\/06\/20132021\/JFROG.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@jfrog","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jfrog.com\/de\/jfrog-toms\/","url":"https:\/\/jfrog.com\/de\/jfrog-toms\/","name":"JFrog Cloud Data Security Addendum | JFrog","isPartOf":{"@id":"https:\/\/jfrog.com\/de\/#website"},"datePublished":"2022-06-21T08:13:12+00:00","dateModified":"2024-08-09T07:42:06+00:00","breadcrumb":{"@id":"https:\/\/jfrog.com\/de\/jfrog-toms\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jfrog.com\/de\/jfrog-toms\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jfrog.com\/de\/jfrog-toms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jfrog.com\/de\/"},{"@type":"ListItem","position":2,"name":"JFrog Cloud Data Security Addendum"}]},{"@type":"WebSite","@id":"https:\/\/jfrog.com\/de\/#website","url":"https:\/\/jfrog.com\/de\/","name":"JFrog","description":"Deliver Trusted Software Releases at Speed and Scale","publisher":{"@id":"https:\/\/jfrog.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jfrog.com\/de\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/jfrog.com\/de\/#organization","name":"JFrog","url":"https:\/\/jfrog.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","width":74,"height":73,"caption":"JFrog"},"image":{"@id":"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/artifrog","https:\/\/x.com\/jfrog","https:\/\/www.linkedin.com\/company\/455737","https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg","https:\/\/www.wikidata.org\/wiki\/Q98608948"],"description":"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.","legalName":"Jfrog, Inc.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}}]}},"_links":{"self":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/pages\/96010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/comments?post=96010"}],"version-history":[{"count":10,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/pages\/96010\/revisions"}],"predecessor-version":[{"id":138263,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/pages\/96010\/revisions\/138263"}],"wp:attachment":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/media?parent=96010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}