<<

SECURITY DATA SHEET Conga Contracts for Security, privacy, and architecture

Services overview Conga Contracts for Salesforce® is a contract lifecycle management application on the Salesforce AppExchange that helps manage, negotiate, and administer contractual agreements. Documents can be created either through an existing Conga Composer account or through Salesforce CPQ (Configure-Price- Quote). As a Salesforce user, you manage all interactions between the Conga services and your Salesforce account exclusively through your Salesforce administration and security settings.

Conga infrastructure only after the completion of a successful background check, awareness and acknowledgment of privacy The Contracts for Salesforce service is regionally hosted and confidentiality agreements, and security training. with Web Services (AWS), available in the Access occurs through a multi-factor VPN or Private Proxy continental , within , or Australia. connection. Additional authentication, authorization, and Each region is mirrored across multiple, geographically accounting are implemented through standard security dispersed data centers for fault tolerance and business mechanisms. These measures are designed to ensure that continuity within the region the service is set to use. only approved operations and support engineers have Customers may select specific regional processing locations access to the systems. Remote access to the environment upon implementation or by submitting a support ticket at is restricted to select operations staff and only available support.getconga.com/Reference/Contact_Support. via two-factor authentication. Encryption for external connections Network bandwidth and latency TLS encryption technology is utilized for data transfer Conga relies on the AWS network infrastructure to provide between all parties involved in the process. TLS connections low latency network availability between the Conga are negotiated for at least 256-bit encryption or stronger. services, Salesforce (when applicable), and end users. The private key used to generate the cipher key is at least The AWS infrastructure is built around regions and 2048 bits. It is recommended that the latest available availability zones. A region is a physical location in the browsers approved by salesforce.com be utilized for world where we have multiple availability zones. Availability connecting to the Conga service, because they are zones consist of one or more discrete data centers, each with compatible with higher cipher strengths and have redundant power, networking, and connectivity, and housed improved security. in separate facilities. These availability zones offer you the Network access control ability to operate production applications and A limited number of Conga operations team members which are more highly available, fault tolerant and scalable are granted access to Customer environments, and then than would be possible from a single . Conga Data Sheet | Conga Contracts for Salesforce Security

monitors applicable networks and addresses internal issues Conga employee access to the service is limited to what is that may impact availability. required for support and maintenance purposes. Employee access is contingent on a successful background check, Anti-virus and anti-malware controls confidentiality agreements, and documented authorization Conga leverages best in class tools in order to monitor and by an engineering VP or above. Access for approved block virus and malware behavior. This includes protection employees is strictly controlled via VPN and against emerging threats beyond traditional, signature other authentication mechanisms. based solutions. Data management and protection Firewalls and intrusion prevention All Conga systems used in the provision of the Conga Conga utilizes firewalls as one component of a layered services, including AWS infrastructure components and approach to application infrastructure security. To operating systems, log information to their respective control access and allow only authorized traffic to Conga system log facility or a centralized Syslog server (for infrastructure, managed firewalls are used. In addition, network systems) to enable security reviews and analysis. Conga employs security policies to manage ingress and Customer data processed within the service is not persisted egress of data based upon protocol, port, source and for long term storage. However, documents flowing through destination within the environment. Any traffic not adhering the service are encrypted within cache for 24 hours. to these strict access controls is discarded at the boundary. Internally host-based intrusion prevention and Post termination, data will be disposed of in a manner monitoring systems are deployed at the server and network designed to ensure that they cannot reasonably be layers, respectively. accessed or read. The only exception is if there is a legal obligation imposed on Conga which prevents it from deleting System hardening and monitoring all or part of the environments or data.

Conga employs standardized system hardening practices The information customers provide during their use of Conga across Conga-managed devices. This includes restricting services that pertains to other individuals and entities is protocol access, removing or disabling unnecessary not collected or used by Conga, and remains under the and services, removing unnecessary user accounts, ownership of Conga’s customers. Conga processes customer patch management, and logging. Additionally, Conga data under the direction of its customers and has no direct employs an enterprise-class vulnerability management control or ownership of the personal data it processes. program to monitor and alert on any non-authorized Customers are responsible for complying with any changes or security configurations. regulations or laws that require providing notice, disclosure, Services undergo 3rd party penetration tests on an annual and/or obtaining consent prior to transferring the data to basis or prior to release of a material change. Conga for processing purposes. Account provisioning and access control Incident response Conga Contracts for Salesforce integrates with your Conga has a rigorous incident management process Salesforce org via standard salesforce.com OAuth via for security events that may affect the confidentiality, the login credentials of a named principal of your choice. integrity, or availability of systems or data. If an incident Authorization configurations allow customers to choose occurs, the security team logs and prioritizes it according deployment for all users or named users. to its severity. Events that directly impact customers are assigned the highest priority. This process specifies courses The OAuth token prefaces Conga service’s interaction of action, procedures for notification, escalation, mitigation, with Salesforce, and the service runs under the authority and documentation. Key staff are trained in forensics and of the named principal Salesforce user, as defined by the handling evidence in preparation for an event, including the customer’s Salesforce administrator. System access use of third-party and proprietary tools. To help ensure the controls include system authentication, authorization, swift resolution of security incidents, the Conga security access approval, provisioning, and revocation for employees. team is available 24/7 to all employees. If an incident The customer is responsible for all end-user administration involves customer data, Conga will inform the customer within the program via salesforce.com. Conga does not and support investigative efforts via our security team. manage the customer’s end-user accounts within salesforce.com. Data Sheet | Conga Contracts for Salesforce Security

Physical security Office disruptions Processing occurs within AWS data centers that are Conga maintains a globally diverse operations staff in housed in nondescript facilities. Professional security staff the event core offices have any significant disruption. strictly control physical access, both at the perimeter Additionally, all Conga employees have laptops and a and at building ingress points. Video surveillance intrusion secure process to access necessary resources to support detection systems are in place at a minimum of all ingress infrastructure and customers. and egress points. Authorized staff must pass two-factor authentication a minimum of two times to access data Conga audits and certifications center floors. All visitors and contractors are required to Conga is committed to achieving and maintaining the trust present identification, are signed in, and are continually and confidence of our customers. Integral to this mission is escorted by authorized staff. Conga’s dedicated, in-house security and privacy team. This team is tasked with enabling Conga customers to meet a Scalability multitude of compliance, data protection, and regulatory Conga services are designed to leverage the benefits of obligations from around the globe. Conga’s trust and a cloud architecture. This includes the capability to scale assurance activities include: compute, memory, and network resources to meet the y Conga certifies to the U.S. Department of Commerce that demands of our customers. Conga uses AWS Auto Scaling it adheres to the EU-U.S. and Swiss-U.S. Privacy Shield to maintain application availability and scale our capacity Frameworks. Conga’s current certification is available up or down automatically, according to demand. With at privacyshield.gov/list. Auto Scaling, Conga can increase the number of processing y instances during demand spikes to maintain performance. Data Processing Addendums or Agreements including the Standard Contractual Clauses as approved by Availability and disaster recovery the European Commission and incorporating stringent Conga maintains geographically diverse data centers and requirements of Article 28 of the EU General Data leverages the near seamless failover technologies from AWS. Protection Regulation 2016/679. The people, processes, and technology necessary to conduct y Service Organization Control (SOC) reports: Conga’s our business are distributed among these sites, with critical information security control environment undergoes an business operations conducted at multiple globally diverse independent evaluation annually. Conga’s most recent locations. If activity at any one of these sites is disrupted, SOC 2, Type II report covering security, availability, and our systems are designed to continue operating at the other confidentiality is available upon request. locations without serious interruption for customers. y Penetration testing conducted by industry-recognized Available data centers are built in clusters in various 3rd party on material environment changes or annually. regions. All data centers are online and serving customers. y Conga only utilizes infrastructure partners No data center is “cold.” In the case of failure, automated demonstrating the ability to meet rigorous standards processes move customer data traffic away from the (ISO 27001, SOC 2). affected area. Each availability zone is designed as an independent failure zone. y Conga is ISO 27001 and ISO 27701 certified.

For More Information Corporate Headquarters Global Offices Email [email protected] or call 13699 Via Varra APAC: +61 2 8417 2399 your local Conga office to talk Broomfield, CO 80020 EMEA: +44 (0) 203 608 0165 to a Conga advisor. +1 303.465.1616 conga.com © Copyright 2020