Technical Documentation
WebsiteLinkedIn
  • Technical Documentation
  • Admin Guides
    • Epiphany Intelligence Platform Administrator Guide
      • Epiphany Intelligence Platform Overview
      • Using Epiphany: A Quickstart Guide
      • Epiphany Tools
        • Dashboards
        • Path Finder
          • Path Finder Search Strings
        • Impact Matrix
        • Vulnerabilities
        • Rogue Report
          • Coverage Area
          • Host List and the Query Builder
        • Inventory
          • Active Directory
        • Tickets
          • Creating Tickets
          • Adding comments to a ticket
          • Ticket Activity
          • Closing A Ticket
          • Reveald Ticket Synchronization
          • Supported Markdown
      • Administration
        • User Management
        • Source Management
          • Site Collectors Setup
          • Cloud-Based Data Sources
            • Data Source Examples
          • On-Prem Data Sources
            • Example
      • Search and Query Guidelines
        • Search Basics
        • Query Operators
        • Complex Epiphany Queries
        • Search Keywords
      • Other Resources
    • Epiphany Validation Engine User's Guide
      • Chapter 1: Architecture of EVE
        • Endpoint
        • Platform
      • Chapter 2 : EVE Endpoint
        • Hardware Requirements
        • Operating System Requirements
        • Custom Threat Module Requirements
        • EVE Agent Requirements
          • Endpoint (physical or VM) with Golden Image.
          • Exclusion of E.V.E. paths in third-party Endpoint solutions
          • Third-party communications configuration in the EVE Platform.
          • Privileges
          • Communication between Endpoint and Platform
          • Frameworks
        • Obtaining The EVE Agent
        • The E.V.E. Agent
          • Controls
          • Notifications
          • Isolation
        • Installing the EVE Agent
          • EVE Agent Installation on Windows EndPoints
          • Validating the Installation of EVE Agent on Windows
          • EVE Agent Installation on Linux Endpoints
          • Validating the Installation of EVE Agent on Linux
          • Backup of the Virtual Machine with Golden Image
        • Updating EVE Agent
        • Uninstalling the EVE Agent
        • Troubleshooting
          • Obtaining Logs of the Agent from the cloud instance
          • Obtaining Logs locally of the EVE Agent on Windows Systems
          • Obtaining Logs locally of the EVE Agent on Linux Systems
          • Obtaining Logs of the Isolation Process
      • Chapter 3: EVE Platform
        • Logging in to the Platform for the first time
        • Navigation Tabs
          • Dashboard
          • Emulation Control
            • Endpoints
              • Endpoints Table
              • Obtaining Endpoint Details
              • Rename an Endpoint: Alias
              • Restart an Agent
              • Emulation History of an Endpoint
              • Remove a Host
              • EVE Agent
              • Download the EVE Agent
              • Download Endpoints Report
              • Windows Installer Update
              • Linux Installer Update
              • Delete an Installer Version
            • Threat Library
              • View the MITRE Matrix Related to a Sample
              • Artifacts Severity
              • Artifacts
            • Emulations
              • Scheduled Emulations
              • Emulation Results
              • Export a .xlsx Report of an Emulation
              • Export a .PDF Report of an Emulation
              • Continuous Validation
            • Custom Threats
          • System Configuration
            • Users
              • Account Types
              • 2FA
              • SSO
        • License
        • Help
        • Support
        • Users Management
        • API
    • Data Usage Guide
      • Primer: How Epiphany Works
      • Data Sources: A Deeper Dive
      • Getting Results: Data Source Outputs
      • Data Privacy and Security
    • Epiphany Security and Trust
      • Introduction
      • Program Details
      • Primary Risks
      • Our Responsibility to You
      • Your Responsibility to Yourself
      • Supplemental Information
      • Secure by Design
      • Conclusion
  • Use Cases
    • Overview
    • 6 Essential Cybersecurity Questions
    • Validate and Manage Assets and Devices in Your Environment
    • Deep Inspection and Audit of Identity Services
    • Manage Exploitability
    • Manage Business Impact
    • Effectively Manage Attack Paths to Enable Better Risk Decisions
  • Epiphany Workflows
    • Technical Analysis
      • Create an Analysis-Focused Dashboard
        • Dashboard Widgets
        • Attack Path Widgets
        • Exposure Widgets
        • Occurrence Widgets
        • Environmental Widgets
        • Administrative Widgets
        • Ticketing Widgets
        • Example Analyst Dashboard
        • Report Features in Dashboard Widgets
      • Attack Path Management
        • Analyze the Attack Path
        • Select a Remediation Recommendation
        • Track Remediation Progress
        • View Potential Exposure to Material impact
        • Tag a Node
      • Vulnerability Management
        • Search for Vulnerabilities
        • Prioritize Vulnerabilities for Remediation
      • Identity Management
        • Identify Risky Conditions in Active Directory (Kerberoastable Users and AS-REP Roastable Users)
        • Identify Risky Conditions in Active Directory (Exposed Active Directory Domain Administrators)
        • Audit High Value Groups
      • Device Management
        • Explore Device Inventory
        • Identify a Rogue System
  • Site Collectors
    • Epiphany Collector Prerequisites
    • Site Collector Guide
      • Create a Site Collector in Epiphany
      • Download a Site Collector Image
      • Generate an Activation Key and Activate Your Epiphany Site Collector
      • Windows GPO Configuration for Epiphany Collector v2.0
      • (Deprecated) Windows GPO Configuration for Epiphany Collector
  • Data Sources
    • Azure Services
      • Obtain the Tenant ID in Azure
      • Register Epiphany as an Application in Azure
      • Add Permissions to the Application - Azure AD
      • Add Permissions to the Application - Defender for Endpoint
      • Add the Azure Credentials to Epiphany
      • How Epiphany Interacts With the Azure API
      • Supplemental Information
    • Carbon Black Cloud
      • Create a Role in Carbon Black Cloud
      • Create a New Carbon Black Cloud User
      • Generate a Carbon Black Cloud API Key
      • Add the Carbon Black Cloud Credentials to Epiphany
      • Supplemental Information
    • Cisco IOS
      • Create a New Cisco IOS User
      • Add the Cisco IOS Credentials to Epiphany
      • Supplemental Information
      • Cisco IOS Manual Collection
    • Claroty
      • Create a Claroty Read-Only User
      • Add the Claroty Credentials to Epiphany
      • How Epiphany Interacts With the Claroty API
    • CrowdStrike
      • Create a CrowdStrike API Key
      • Add the CrowdStrike Credentials to Epiphany
      • How Epiphany Interacts With the CrowdStrike API
      • Supplemental Information
    • Cylance
      • Create a New Cylance User
      • Add the User's Cylance Credentials to Epiphany
      • How Epiphany Interacts With the Cylance API
      • Supplemental Information
    • Manage Engine Patch Manager Plus
      • Create a New Patch Manager Plus User
      • Create a New Patch Manager Plus API Key
      • Add the Patch Manager Plus Credentials to Epiphany
      • How Epiphany Interacts With the Patch Manager Plus API
    • NCentral
      • Create an NCentral Read-Only User and an API Key
      • Add the NCentral Credentials to Epiphany
      • How Epiphany Interacts With the NCentral API
    • Nessus
    • Qualys
      • Create a New Qualys User
      • Add the Qualys Credentials to Epiphany
      • How Epiphany Interacts With the Qualys API
      • Supplemental Information
    • Rapid7 Nexpose
      • Create a New Rapid7 Nexpose User
      • Add the User's Credentials to Epiphany
      • Deploy an Epiphany Site Collector
      • Associate the Site Collector and the Data Source
      • How Epiphany Interacts With the Rapid7 Nexpose Data Source
      • Supplemental Information
    • SentinelOne
      • Create a New Sentinel One User and Generate an API Key
      • Add the User's Sentinel One Credentials and API Key to Epiphany
      • Supplemental Information
    • Tenable
      • Create a New Tenable User
      • Tenable IO Permissions
      • Generate an API Key
      • Add the User's Credentials to Epiphany
      • Deploy a Site Collector (Tenable.sc only)
      • Associate the Site Collector and the Data Source (Tenable.sc only)
      • How Epiphany Interacts With the Tenable Data Source
      • Supplemental Information
    • Trend Micro Apex One
      • Create a Trend Micro Apex One API Key
      • Add the Trend Micro Apex One Credentials to Epiphany
      • How Epiphany Interacts With the Apex Server
      • Supplemental Information
    • Trend Micro Cloud One Deep Security
      • Create a Trend Micro Cloud One Account and API Key
      • Add the Trend Micro Cloud One Credentials to Epiphany
      • How Epiphany Interacts With the Trend Micro Cloud One API
      • Supplemental Information
    • Vicarious vRx
      • Create an API key in Vicarious vRx
      • Add the Vicarious vRx API Key to Epiphany
    • Windows AD
      • Create an AD Service Account for Epiphany
      • Create the Windows AD GPO
      • Deploy the Epiphany Site Collector
      • Add the Windows AD Credentials to the Windows AD Data Source Configuration in Epiphany
      • Supplemental Information
  • Data Sources (Early Access)
    • Armis
      • Create a New Armis User
      • Generate an Armis API Key
      • Add the Armis User's Credentials to Epiphany
      • How Epiphany Interacts With the Armis API
      • Supplemental Information
    • ArubaOS
      • Use SSH to Collect ArubaOS Network Appliance Information
      • Add the ArubaOS Credentials to Epiphany
      • ArubaOS Manual Collection
      • Supplemental Information
    • Automox
      • Create a New Automox User and a New Automox API Key
      • Add the Automox Credentials to Epiphany
      • How Epiphany Interacts with the Automox API
      • Supplemental Information
    • AWS
      • Create a New AWS User and AWS API Credentials
      • Add the AWS Credentials to Epiphany
      • How Epiphany Interacts with the AWS API
      • Supplemental Information
    • BeyondTrust
      • Create an Explicit User Account in BeyondTrust
      • Deploy an Epiphany Site Collector
      • Add the BeyondTrust Credentials to Epiphany
      • Supplemental Information
    • Bloodhound
      • Bloodhound Set Up 1
      • Bloodhound Set Up 2
      • Add the Bloodhound Credentials to Epiphany
      • How Epiphany Interacts With the Bloodhound Data Source
      • Supplemental Information
    • Cisco Meraki
      • Generate a Read-Only Meraki Account
      • Generate a Meraki API Key
      • Collect the Meraki Network Maps
      • Add the Cisco Meraki Credentials to Epiphany
      • Supplemental Information
    • FortiOS
      • Generate a FortiOS API Token
      • Add the API Token to Epiphany
      • Supplemental Information
    • HPE Comware
      • Data Collection for Epiphany
      • Supplemental Information
    • Juniper OS
      • Configure and Verify the Rest API
      • Data Collection for Epiphany
      • Supplemental Information
    • Okta
      • Okta Set Up 1
      • Okta Set Up 2
      • Add the Okta Credentials to Epiphany
      • How Epiphany Interacts With the Okta Data Source
      • Supplemental Information
    • Palo Alto PAN-OS and Panorama
      • Create a New PAN-OS or Panorama User
      • Add the Panorama or PAN-OS Credentials to Epiphany
      • Add the SSH Credentials to Epiphany
      • PAN-OS and Panorama SSH/Manual Collection
      • How Epiphany Interacts With the Palo Alto API/Console
      • Supplemental Information
    • Windows AD (Legacy Version)
      • Create the Windows AD GPO
      • Supplemental Information
    • VMware vSphere
      • Create the vSphere User Account
      • Create a Role
      • Assign Read-Only permissions to vCenter
      • Assign a User Account the Role on a single Object
      • Add vSphere as a Data Source within the Console
  • Changelog
    • 2023-08-02: Phase 1 Customer Portal
    • 2023-08-25: Epiphany Administrator Guide v1.0
    • 2023-09-14: Product Update
    • 2023-09-27: Product Update
    • 2023-10-13: Product Update
    • 2023-12-01: Product Update
  • Legal Notice
    • Terms and Conditions
    • Privacy
Powered by GitBook
On this page
  • Data Ingestion, Storage, and Privacy
  • Network Security and Server Handling
  • Endpoint Security
  • Access Control Provisioning
  • Authentication
  • Password Management
  • System Monitoring, Logging, and Alerting
  • Data Retention and Disposal
  • Disaster Recovery and Business Continuity Plan
  • Responding to Security Incidents
  • Vendor Management
  • External Validation
  1. Admin Guides
  2. Epiphany Security and Trust

Secure by Design

PreviousSupplemental InformationNextConclusion

Last updated 1 year ago

The Epiphany Intelligence Platform's software, the platform it runs on, and the environment it runs within, is built with security as its core tenant. To help eliminate possible gaps in security, we have implemented redundant security controls within our environment and throughout our software. However, while we strive to catch all vulnerabilities in the due course of business, we realize that sometimes mistakes happen. We encourage our customers, industry experts, and partners to submit any bugs or security concerns to our security email at .

Data Ingestion, Storage, and Privacy

To protect our customers and their users from data compromise, the Epiphany Intelligence Platform takes every effort to ensure any personal identifying information (PIl) collected is stored anonymized, obfuscated, hashed and/or encrypted. The Epiphany Intelligence Platform only collects data from systems our customers have either uploaded or where our customer has enabled data ingestion to the Epiphany Intelligence Platform via the use of an API.

Data at rest in the Epiphany Intelligence Platform's production network is encrypted using FIPS 140-2 compliant encryption standards, which applies to all types of data at rest within the Epiphany Intelligence Platform’s relational databases, file stores, database backups, etc. All encryption keys are stored in a key management system with very limited access.

The Epiphany Intelligence Platform has implemented appropriate safeguards to protect the creation, storage, retrieval, and destruction of secrets such as encryption keys and service account credentials. Each Epiphany Intelligence Platform customer's data is either hosted in our environment and is logically separated from any other customers' data or hosted in your own environment with a unique Epiphany Intelligence Platform instance. We use a combination of storage technologies to ensure customer data is protected from hardware failures and returns quickly when requested.

The Epiphany Intelligence Platform service is hosted in data centers maintained by industry-leading service providers, offering state-of-the-art physical protection for the servers and infrastructure that comprise the Epiphany Intelligence Platform operating environment. Supplemental information on data usage within the Epiphany Intelligence Platform can be found in the Epiphany Intelligence Platform .

Network Security and Server Handling

The Epiphany Intelligence Platform divides its systems into separate networks to better protect sensitive data. Systems supporting testing and development activities are hosted in a separate network from systems supporting the Epiphany Intelligence Platform's production infrastructure.

All servers within our production fleet are hardened (e.g., disabling unnecessary ports, removing default passwords, etc.) and have a base configuration image applied to ensure consistency across the environment. Network access to the Epiphany Intelligence Platform's production environment from open, public networks (the Internet) is restricted, with only a small number of production servers accessible from the Internet.

Only those network protocols essential for delivery of the Epiphany Intelligence Platform’s service to its users are open at our perimeter and there are mitigations against distributed denial of service (DDoS) attacks deployed at the network perimeter. Additionally, for host-based intrusion detection and prevention activities, the Epiphany Intelligence Platform logs, monitors, and audits all system calls and has alerting in place for system calls that indicate a potential intrusion.

Endpoint Security

All workstations used by Reveald personnel are configured by the Epiphany Intelligence Platform to comply with our standards for security. These standards require all workstations to be properly configured, updated, tracked, and monitored. The Epiphany Intelligence Platform requires workstations to encrypt data at rest, use a modern endpoint protection, have strong passwords, and lock when idle.

Access Control Provisioning

To minimize the risk of data exposure, the Epiphany Intelligence Platform adheres to the principles of least privilege and role-based permissions when provisioning access. Workers are only authorized to access data that they reasonably must handle in order to fulfill their current job responsibilities. All production access is reviewed at least quarterly by our security team.

Authentication

To further reduce the risk of unauthorized access to data, the Epiphany Intelligence Platform employs multi-factor authentication for all access to systems with highly sensitive data, including our production environment, which houses our customer data. Where possible and appropriate, the Epiphany Intelligence Platform uses private keys for authentication, in addition to the previously mentioned multi-factor authentication on a separate device.

Password Management

The Epiphany Intelligence Platform leverages a password management system, where possible, to ensure enhanced credential management and monitor passwords for uniqueness, complexity, reuse, dark web compromise, and other password-related risks. In cases where this is not possible, the Epiphany Intelligence Platform ensures those systems have proper controls in place and are monitored.

System Monitoring, Logging, and Alerting

The Epiphany Intelligence Platform monitors servers, workstations, and mobile devices to retain and analyze a comprehensive view of the security state of its corporate and production infrastructure. Administrative access, use of privileged commands, and system calls on all servers in the Epiphany Intelligence Platform's production network are logged and retained for at least two years. Analysis of logs is automated to the extent practical to detect potential issues and alert responsible personnel. All production logs are stored in a separate network that is restricted to only the relevant security personnel.

Data Retention and Disposal

We will store your usage data until such time when you withdraw your consent for us to do so. All other data as specified above will be retained for as long as is necessary for the purposes for which we originally collected it. We may also retain information as required by law. Customer data is removed immediately upon deletion by the end user or upon expiration of message retention as configured by the administrator.

The Epiphany Intelligence Platform hard deletes all information from currently running production systems and backups are destroyed the day after the temporary retention period. The Epiphany Intelligence Platform's hosting providers, including customers that host the Epiphany Intelligence Platform or Epiphany Intelligence Platform images on premises, are responsible for ensuring removal of data from disks is performed in a responsible manner before they are re-purposed.

Disaster Recovery and Business Continuity Plan

The Epiphany Intelligence Platform utilizes services deployed by its hosting provider to distribute production operations across multiple AWS regions within the continental United States. These AWS regions are within separate geographic regions and protect the Epiphany Intelligence Platform's service from loss of connectivity, power infrastructure, and other common location-specific failures.

Production transactions are replicated among these discrete operating environments to protect the availability of the Epiphany Intelligence Platform's service in the event of a location-specific catastrophic event. The Epiphany Intelligence Platform also retains a full back-up copy of production data in a remote location significantly distant from the location of the primary operating environment. Full backups are saved to this remote location at least once per day and transactions are saved continuously. The Epiphany Intelligence Platform tests backups at least quarterly to ensure they can be successfully restored.

Responding to Security Incidents

Vendor Management

To run efficiently, the Epiphany Intelligence Platform relies on a select number of trusted external service providers. These service providers are carefully selected and meet high data protection and security standards. We only share information with them that is required for the services offered and we contractually bind them to keep any information we share with them as confidential and to process personal data only according to our instructions. Where those service providers may impact the security of the Epiphany Intelligence Platform's production environment, we take appropriate steps to ensure our security posture is maintained by establishing agreements that require service organizations to adhere to confidentiality commitments we have made to users. The Epiphany Intelligence Platform monitors the effective operation of the organization's safeguards by conducting reviews of all service organizations' controls before use and at least annually.

External Validation

  • Security Compliance Audits. The Epiphany Intelligence Platform is continuously monitoring, auditing, and improving the design and operating effectiveness of our security controls. These activities are regularly performed by both third-party credentialed assessors and the Epiphany Intelligence Platform's internal risk and compliance team. Audit results are shared with senior management and all findings are tracked to resolution in a timely manner.

  • Penetration Testing. In addition to our compliance audits, the Epiphany Intelligence Platform engages independent entities to conduct application-level and infrastructure-level penetration tests at least annually. Results of these tests are shared with senior management and are triaged, prioritized, and remediated in a timely manner. Customers may receive executive summaries of these activities by requesting them from their account executive.

  • Customer Driven Audits and Penetration Tests. Our customers are welcome to perform either security controls assessments or penetration testing on the Epiphany Intelligence Platform's environment during our annual Epiphany "Bright Idea" hack-a-thon. Please contact your account executive to express your desire to participate in these types of activities.

Upon termination of your production subscription the Epiphany Intelligence Platform will encrypt a current state backup of your information and retain it for 15 days should you wish to re-activate your subscription. If you wish this not be done, please notify us at .

The Epiphany Intelligence Platform has established policies and procedures for responding to potential security incidents. All security incidents are managed by the Epiphany Intelligence Platform's dedicated Detection and Response Team (DART). We have defined the types of events that must be managed via the incident response process and classify them based on severity. In the event of an incident, affected customers will be informed via email from our customer experience team. Incident response procedures are tested and updated at least annually. To initiate an investigation for a security-related concern, you can reach out to your customer service representative with the details or email .

security@reveald.com
Data Usage Guide
security@reveald.com
security@reveald.com