Security is front of mind for everything we do at Rally Cry. Protecting the personal information of our customers and players is paramount.
Rally Cry's Security and Privacy teams establish policies and controls, monitor compliance with those controls, and prove our security and compliance to third-party auditors.
Rally Cry requires vulnerability scanning at key stages of our Secure Development Lifecycle (SDLC):
All corporate devices are centrally managed and are equipped with mobile device management software and anti-malware protection. Endpoint security alerts are monitored with 24/7/365 coverage. We use MDM software to enforce secure configuration of endpoints, such as disk encryption, screen lock configuration, and software updates.
Rally Cry provides security training to all employees upon onboarding and annually through educational modules. In addition, all new employees attend a mandatory live onboarding session centered around key security principles.
All new engineers also attend a mandatory live onboarding session focused on secure coding principles and practices.
Rally Cry’s security team shares regular threat briefings with employees to inform them of important security and safety-related updates that require special attention or action.
Rally Cry uses a risk-based approach to vendor security. Factors which influence the inherent risk rating of a vendor include:
Once the inherent risk rating has been determined, the security of the vendor is evaluated in order to determine a residual risk rating and an approval decision for the vendor.
Rally Cry uses Google Workspaces to secure our identity and access management. We enforce the use of Two-Factor Auth (2FA) wherever possible.
Rally Cry employees are granted access to applications based on their role, and automatically deprovisioned upon termination of their employment. Further access must be approved according to the policies set for each application.
Please visit our Responsible Disclosures Page.