Podio Security Whitepaper
Podio Security Whitepaper
Podio Security Whitepaper
Security overview
podio.com
Podio security White Paper 2
Podio, a cloud service brought to you by Citrix, provides a secure collaborative work
platform for team and project management. Podio features powerful social col-
laboration tools and customizable workflow apps, plus the ability to seamlessly
integrate other cloud services into Podio workspaces. Podio follows the Software
as a Service delivery model and does not require any premisebased software de-
ployment. Its interactive, cloud-based work environment empowers teams and in-
dividuals to manage workflows and share information through both real-time and
asynchronous communication.
podio.com
Podio security White Paper 3
For this reason, Podio places great emphasis on user authentication. To begin with,
users must be registered using a validated email account, which is associated with
an identified organization. No guest or anonymous access to the system is per-
mitted. In addition, numerous techniques are employed to detect and prevent
unauthorized account access, such as complex password enforcement, soft and
hard account lockout triggered by repeated unsuccessful login attempts, and the
logging and continuous monitoring of account probing and other anomalous be-
havior.
In addition to end-user access via a web browser or a Podio mobile app, Podio may
be accessed by registered third-party services or applications that are built on the
Podio API. Access through the API uses the widely accepted and deployed OAuth2
protocol for authentication and authorization. Beyond the protection provided by
SSL/TLS and any native application techniques, every API request is authenticat-
ed by the presence of a unique, random access token, securely obtained through
OAuth2 using a registered client identifier, client secret, and set of user credentials.
A secure foundation
Although protecting the front door is essential, if the networks and systems that
host a service are not themselves secure, the service might still be vulnerable. This,
of course, is the reason that Podio is built upon a foundation of network, host and
physical security.
podio.com
Podio security White Paper 4
Web, application and database servers supporting Podio reside within highly se-
cured worldwide datacenters. Physical access to these datacenters is continuously
monitored and restricted to authorized personnel only. The servers themselves are
“hardened” to baseline secure configuration standards, and are dedicated to run-
ning only those services required to support Podio. Citrix policy requires that serv-
ers remain up-to-date with the latest security patches, and undergo periodic reas-
sessment through both internal and independent auditing and penetration testing.
Network access to the systems hosting Podio is strictly controlled through firewalls
and other network security devices designed to detect and respond to various at-
tacks, including but not limited to denial-of-service (DoS) attacks originating from
the Internet. Backend servers and services are never directly accessible to external
systems or personnel. Furthermore, multiple levels of host and network security
are employed to ensure that only authorized access is permitted between backend
systems, effectively containing any potential internally-leveraged attacks. Access to
and activity on systems is centrally logged and continuously monitored for anom-
alous patterns or behavior.
Once your information has been entered into the Podio system, it is secured with
multiple levels of encryption and access controls. Podio is designed to securely al-
low the efficient sharing of information in a manner that is flexible yet highly visible
and easily managed. Data resides in workspaces, which are associated with specific
organizations. Only those users explicitly granted access to your information may
view or modify it. The design of the system requires that every access request pass
through an authorization subsystem that verifies the access rights of the user be-
fore allowing the request to proceed.
Not even Podio staff or administrators can access your information, unless you
explicitly grant them the right to do so. Unlike some data management systems,
Podio does not include the concept of “root” or “superuser” access. This helps to
ensure the privacy of your information, even against inadvertent or other internal
exposure. Sensitive configuration information, passwords and keys are secured
using the latest in cryptographic technology. The Advanced Encryption Standard
(AES) is used with a 256-bit key to encrypt sensitive information that must later be
available to authorized users in plaintext form. Passwords are secured through a
podio.com
Podio security White Paper 5
Secure by design
In addition to the security measures described, the software services that comprise
Podio are developed by Citrix using processes that guarantee the integration of
security assurance techniques at every stage of the development and deployment
lifecycle. Every significant design and architectural decision must undergo a review
process known as “threat modeling,” in which foreseeable threats to the system are
evaluated and measured in light of the proposed design/architectural features. Ad-
ditionally, code is required to be assessed for security flaws via static analysis, while
new and updated systems must be scanned and tested for security weaknesses us-
ing industry-leading manual and automated application vulnerability assessment
tools.
Availability
All the protection measures in the world will prove meaningless if you cannot ac-
cess your information or systems when needed. Thus, one of our top priorities in
security by design is availability.
As previously mentioned above, security devices are also in place in every Citrix
datacenter to implement countermeasures to denial-of-service (DoS) attacks. To
prevent unintended destruction or corruption of information, Podio systems are
podio.com
Podio security White Paper 6
backed up hourly and daily, with backups being encrypted and stored at a secure
off-site location. Additionally, the Podio interface includes a protection mechanism
that requires explicit user acknowledgement before executing any record deletion
requests.
Summary
Citrix takes the privacy, security and protection of your data very seriously. We have
built our services, including Podio, around this priority. Our security policies and
controls align with industry standards, and we review them regularly to ensure con-
tinued compliance. Businesses, work teams and individuals can confidently use the
Podio service to share information, track projects and manage workflows, knowing
that their data is protected by the architecture and policies outlined above.
Customer Domicile Contracting Entity Notice address Governing law Governing venue
North, South or Central Citrix Systems, Inc., Citrix Systems, Inc., Florida and controlling Broward County, Florida,
America, or the Caribbe- 851 West Cypress Creek 851 West Cypress Creek United States federal law U.S.A.
an (“Americas”) Rd. Rd.,
Ft. Lauderdale, Florida Ft. Lauderdale, Florida
33309, 33309,
U.S.A. U.S.A.
Europe, Middle East or Citrix Systems Interna- Citrix Systems Interna- Switzerland Canton of Zurich
Africa tional, GmbH tional, GmbH In each case without
Rheinweg 9, Rheinweg 9, reference to the conflict
CH-8200 Schaffhausen, CH-8200 Schaffhausen, of laws principles, and
Switzerland Switzerland excluding the United
Nations Convention on
Contracts for the Interna-
tional Sale of Goods
@2016 Citrix Systems, Inc. All rights reserved. Citrix and Podio are trademarks of Citrix Systems,
Inc. or one or more of its subsidiaries, and may be registered in the U.S. Patent and Trademark
Office and in other countries. All other trademarks appearing in this piece are the property of their
respective owners.