Zabbix follows a strict process when developing new versions of our software, according to the Zabbix life cycle and release policy. All tasks are subject to strict standards imposed by Zabbix:
To assure our customers that Zabbix is a well-managed and professional organization, that appropriate information security measures are applied as necessary, and that customers can trust the source code, our professional services, and our Zabbix Cloud service, Zabbix has:
Every customer's Zabbix instance is isolated from one another.
Every customer's Zabbix instance data is on EBS volumes and encrypted at-rest with AES-256.
Every customer node uses Amazon Time Sync Service NTP pools (time.aws.com) as a time source.
AWS Snapshot technology and EBS encryption with AES-256 at-rest data encryption is used for customer backups.
All in-transit communications both internally and externally use at least TLS 1.2 and (where possible) TLS 1.3 certificates.
Users can sign up with a valid email address and set their password in the Zabbix cloud platform. OTP codes are used for security purposes.
Customer passwords for local accounts are protected with a BCRYPT hashing algorithm, so Zabbix employees do not have access to your password and cannot retrieve it for you. The only option if you lose your password is to reset it.
In cases where Zabbix employees need to connect to a customer's backend or frontend components, review log files, solve any issue with Services, at a customer’s explicit request for technical support reasons, or as required by law, we use combination of enterprise grade key management services and secret management technologies. There are no standing privileges for engineers or support team. We practice Just-in-Time access for as brief a period as possible.
Every employee working within Zabbix and accessing Zabbix Cloud in any way is using company owned and managed devices with XDR and at-rest encryption.
Multiple sets of best practices are used – systems are hardened using CIS, AWS VPC best practices, AWS IAM best practices, etc.
We have several internal solutions in place that are used for monitoring our systems, availability, performance, and other critical parameters.
System availability can be checked at https://cloud-status.zabbix.com/
Before reporting the issue:
Make sure that the issue you are submitting is not related to server configuration, 3rd party scripts and utilities. In order to avoid any possible issues with server configuration we advise Zabbix users to read
Best practices for secure Zabbix setup.
To report a security issue, create a new issue in the Zabbix Security Reports (ZBXSEC) section of the public bug tracker describing the problem (and a proposed solution if possible) in detail. This way, we can ensure that only the Zabbix security team and the reporter have access to the case.
The following information will be helpful for the Zabbix Security team:
Developed in partnership with HackerOne, the world's leading platform for ethical hackers, the Zabbix bug bounty program contributes to the security of the product by allowing hackers to discover potential security vulnerabilities in different Zabbix components. The program offers up to $3,000 as a reward for discovering and reporting a bug. More information can be found in the Zabbix bug bounty page.