JFrog Trust Access Control & Identity Management

Permissions and Authentication

JFrog has defined access roles for each system and service based on least privilege principle. 

Access to all our applications is possible only via Single Sign-on (SSO) and 2-factor authentication (2FA) with strong password policies.

Password Manager

JFrog requires that its employees use a password manager to ensure that they use unique and complex passwords, and store them in a secure vault.

Secured Access

JFrog uses a zero trust solution to securely connect our employees, devices, and apps over JFrog’s internal network. Our zero trust solution provides Web and URL filtering, sandboxing, cloud firewall, CASB and DLP.
JFrog engineers connect to our production resources using an advanced 2FA and just-in-time access solution, which allows us to employ the principle
of least privilege and conduct a full audit.

Endpoint Protection 

JFrog laptops are equipped with encryption technology that’s turned on by default, in compliance with our policy, along with advanced anti-malware software.

Email Protection

JFrog uses email protection solutions designed to prevent malware, zero-day attacks, phishing, BEC (business email compromise), spam and N-days.

Powering the Software
that Powers the World

It’s our Liquid Software vision to automatically deliver software
packages seamlessly and securely from any source to any device.