Security and privacy at Rally Cry

Security is front of mind for everything we do at Rally Cry. Protecting the personal information of our customers and players is paramount.

Governance

Rally Cry's Security and Privacy teams establish policies and controls, monitor compliance with those controls, and prove our security and compliance to third-party auditors.

.01

Access should be limited to only those with a legitimate business need and granted based on the principle of least privilege.

.02

Security controls should be implemented and layered according to the principle of defense-in-depth.

.03

Security controls should be applied consistently across all areas of the enterprise.

.04

The implementation of controls should be iterative, continuously maturing across the dimensions of improved effectiveness, increased auditability, and decreased friction.

Data Protection

Data at Rest

Data in Transit

Secret Management

All datastores with customer data, in addition to storage buckets, are encrypted at rest. Sensitive collections and tables also use row-level encryption.//

Rally Cry uses TLS 1.2 or higher everywhere data is transmitted over potentially insecure networks.//

Application secrets are encrypted and stored securely via Google Secrets Manager, and access to these values is strictly limited.//

Product Security

Vulnerability scanning

Rally Cry requires vulnerability scanning at key stages of our Secure Development Lifecycle (SDLC):

  • Static analysis (SAST) testing of code during pull requests and on an ongoing basis
  • Malicious dependency scanning to prevent the introduction of malware into our software supply chain
  • Network vulnerability scanning on aperiod basis

Enterprise Security

Endpoint protection

All corporate devices are centrally managed and are equipped with mobile device management software and anti-malware protection. Endpoint security alerts are monitored with 24/7/365 coverage. We use MDM software to enforce secure configuration of endpoints, such as disk encryption, screen lock configuration, and software updates.

Security education

Rally Cry provides security training to all employees upon onboarding and annually through educational modules. In addition, all new employees attend a mandatory live onboarding session centered around key security principles.

All new engineers also attend a mandatory live onboarding session focused on secure coding principles and practices.

Rally Cry’s security team shares regular threat briefings with employees to inform them of important security and safety-related updates that require special attention or action.

Vendor security

Rally Cry uses a risk-based approach to vendor security. Factors which influence the inherent risk rating of a vendor include:

  • Access to customer and corporate data
  • Integration with production environments
  • Potential damage to the Rally Cry or customer brands

Once the inherent risk rating has been determined, the security of the vendor is evaluated in order to determine a residual risk rating and an approval decision for the vendor.

Identity and access management

Rally Cry uses Google Workspaces to secure our identity and access management. We enforce the use of Two-Factor Auth (2FA) wherever possible.

Rally Cry employees are granted access to applications based on their role, and automatically deprovisioned upon termination of their employment. Further access must be approved according to the policies set for each application.

Looking to report a security concern?

Please visit our Responsible Disclosures Page.