Trust Center

Start your security review
View & download sensitive information
Ask for information
Search items
ControlK

Overview

Welcome to gridX's Security Portal.

Our customers trust us with a crucial part of their business in a very sensitive and regulated area. We understand that if our services are unreachable, your company’s success might be affected. Consequently, we aim to go beyond industry best practices and be transparent about the security measures we take.

We actively foster a culture of security. As part of the development of new features and components, potential security issues are being analyzed and measures are taken. On this page, we provide an overview of gridX security measures and principles and dive into details of the respective components and how these security measures apply there. This page is not guaranteed to be a complete picture of all measures gridX applies as these are constantly evolving.

Compliance

We adhere to industry best practices and we are working towards compliance certifications.

Start your security review
View & download sensitive information
Ask for information

gridX is reviewed and trusted by

ChargePoint-company-logoChargePoint
E.ON-company-logoE.ON
Viessmann-company-logoViessmann
IBC SOLAR-company-logoIBC SOLAR
Fastned-company-logoFastned
ChargeOne-company-logoChargeOne
Swiss Post-company-logoSwiss Post
Homenergy-company-logoHomenergy
Information Security Policy
Software Development Lifecycle
Information Security Roles
Security Incident Response Plan
Summary of Pentest Reports
Vulnerability Disclosure Policy
Data Into System
Acceptable Use Policy
Access Control Policy
Asset Management Policy
Data Classification Policy
Data Security Policy
Network Security Policy
Password Policy

Risk Profile

Data Access LevelRestricted
Impact LevelModerate
Recovery Time Objective24 hours
View more

Product Security

Audit Logging
Data Security
Integrations
View more

Reports

We may provide security-related reports upon request.

Self-Assessments

We are working on our security compliance. We can provide completed questionnaires upon request.

Data Security

Access Monitoring
Backups Enabled
Data Erasure
View more

App Security

Responsible Disclosure
Bot Detection
Code Analysis
View more

Data Privacy

Cookies
Data Breach Notifications
Data Into System
View more

Access Control

Data Access
Logging
Password Security

Infrastructure

Status Monitoring
Amazon Web Services
BC/DR
View more

Endpoint Security

Disk Encryption
Endpoint Detection & Response
Mobile Device Management

Network Security

Firewall
Security Information and Event Management
Virtual Private Cloud
View more

Corporate Security

Asset Management Practices
Email Protection
Employee Training
View more

Policies

Acceptable Use Policy
Access Control Policy
Asset Management Policy
View more

Security Grades

SecurityScorecard
gridX Scorecard
Security Scorecard A grade
CryptCheck
https://xenon.gridx.ai/
A+
https://api.gridx.de/
A+
https://my.gridx.de/
A+
https://platform.gridx.ai/
A+
ImmuniWeb
https://xenon.gridx.ai/
A
https://api.gridx.de/
A
https://my.gridx.de/
A
https://platform.gridx.ai/
A
View more

Trust Center Updates

gridX is not impacted by the XZ Utils Backdoor

VulnerabilitiesCopy link

In response to the publication of CVE-2024-3094, commonly known as the "XZ Utils Backdoor", our security and infrastructure teams worked to assess whether gridX is impacted by such an issue.

While investigations of this issue are still ongoing, as of now, we found no evidence that the Linux distributions and the versions of libraries that are impacted, such as liblzma and xz, utilized within our cloud infrastructure and on our hardware are vulnerable.

Should we discover that gridX is impacted in any way, shape, or form, we will swiftly remediate this issue and contact any affected gridX partners, in accordance with our security incident response policy and plan.

Published at N/A

gridX is not affected by CVE-2023-22522 - RCE Confluence Server Vulnerabilities

SubprocessorsCopy link

This week one of our subprocessors, Atlassian, reported a critical vulnerability in their Confluence Data Center and Server services in versions between 4.x.x through 7.x.x and a number of 8.x.x versions.

At gridX, we utilize a few Atlassian services to keep a knowledge base and track our tasks and goals, the content of which may include some basic information about our customers but no personal data is stored there. Furthermore, "Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue." That is, being a user of Atlassian Cloud, gridX and the Atlassian services it utilizes, are not affected by the aforementioned vulnerability.

Similarly, gridX is not affected by the more recent critical vulnerability, CVE-2023-22527, due to the same reasons mentioned above.

Published at N/A*

gridX is not affected by the New Relic breach

SubprocessorsCopy link

Given that a few of our subprocessors happen to be impacted by New Relic's recent breach, our security team started an investigation to assess whether any of our customers' data may have been impacted.

The result of this investigation was that no customer(-related) data was impacted by such an attack, which mainly impacted staging environments of New Relic on which data is stored that "provide visibility into how [New Relic's] customers are using New Relic and certain logs".

Published at N/A

gridX is Not Affected by the MOVEit Vulnerabilities

GeneralCopy link

The file transfer platform MOVEit was recently affected by two zero-day vulnerabilities, CVE-2023-34362 and CVE-2023-35036, that enabled un-authenticated attackers to gain unauthorized access to MOVEit Transfer's database.

The security team at gridX has investigated the matter and concluded that:

  • gridX does not utilize the MOVEit application or any other platforms that utilize it, such as Zellis.
  • Similarly, gridX's subprocessors do not utilize any of the platforms affected by the aforementioned vulnerabilities.
Published at N/A*

If you think you may have discovered a vulnerability, please send us a note.

Powered bySafeBase Logo