At CarbonChain, we understand the critical importance of trust and security in order to be your carbon accounting platform. That's why, from our very inception, we have made the development of a secure platform and product a priority.
In 2024, CarbonChain was certified by Isoqar as ISO 27001:2022 compliant. This was an opportunity for us to show an external auditor our Information Security Management System (ISMS), how we approach and mitigate risk, and the operational controls that allow us to operate a secure company.
We were proud to complete this process with no findings; this means zero non-conformances to the ISO 27001 specification were identified and no opportunities for improvement were flagged. The certificate is valid until 31st July 2027; until then, CarbonChain will undertake a stringent process for ongoing review.
Protecting our customer data is critical to build a growing and sustainable business that enables companies to report on their Carbon emissions and work towards reducing them. We operate CarbonChain with the following processes:
An effective secure software development lifecycle (Secure SDLC) is a critical component in building resilient and trustworthy software solutions. By integrating security into every phase of the development process, from initial design to deployment and maintenance, CarbonChain proactively identifies and mitigates vulnerabilities before they become exploitable weaknesses.
A key component of this approach is leveraging frameworks like the OWASP Top 10, which provides a comprehensive list of the most critical security risks to web applications. By addressing these risks during development, organizations can significantly reduce the likelihood of successful attacks.
Additionally, a robust Secure SDLC includes a commitment to regular patching of software versions. As new vulnerabilities are discovered, we rely on a variety of external signals to keep us informed so that we can rapidly patch and deploy our software ahead of industry standards.
Ensuring that there is ongoing value to our Information Security Management Systems means regular review and development of our risk and operational controls. As a result, CarbonChain has committed to a series of actions every quarter to ensure that our systems and controls grow and adapt ahead of our company growth.
We’re a UK-headquartered company and, outside of the USA, many of our customers expect a ISO 27001 certification rather than a SOC2 Type II certification.
The ISO 27001 standard itself – and its audit process – is more in-depth than SOC 2 and results in a more secure platform by default.
Most of the five SOC2 trust service criteria map directly into ISO 27001 and so these can be considered to be equivalent.
CarbonChain offers secure delivery options: direct to customer-specific storage locations using secure delivery mechanisms or via SendSafely, a secure data delivery system.
Your data is stored and processed in European data centers. We rely on the following sub-processors to provision infrastructure and host our services:
Your data is processed in cloud environments that we provision and manage to ensure that data is isolated, secure and access is limited and audited.
Who has access to your data?
At all times, access to data is restricted by our role-based access controls and audited.
We work with you during onboarding to ensure that access to our product and the required visibility rules are defined for your teams and business. This access can be audited at any time.
We prefer integrating our customer’s Identity/SSO provider into our product so that internal events (for example, the departure of an employee) immediately result in access being revoked in our platform.
At CarbonChain we release software multiple times per week to ensure that we are delivering new value to our customers as quickly as possible. Our secure SDLC ensures that our testing and deployment approach delivers secure, validated software to our customers without our team needing to manually deploy and configure our software.
In addition to releasing software multiple times per week, we also include recent security patches that we have reviewed and approved to the Open Source software we rely on.
On a periodic basis, as part of our ISMS, we assess business continuity risk and run scenarios with our management team.
Additionally we identify disaster scenarios and run drills to ensure our Tech team is familiar with the processes to escalate, communicate to customers, triage and repair our product during a variety of disaster scenarios.
CarbonChain does not offer a bug bounty program at this time. Any submissions are gratefully received at support[at]carbonchain[dot]com.