- Docs
- Compliance
- Network Security
Network Security
Files.com employs a layered security model to protect its infrastructure, network, and systems. This article describes our use of firewalls, intrusion detection and prevention systems, connectivity options, malware protection, and more. These systems are reviewed annually as part of our SOC 2 Type II audit and are continuously monitored and improved.
Firewalls & Network Segmentation
All Files.com servers are protected by firewalls configured in a default-deny posture. Only required ports are exposed to the public internet.
Internal systems are segmented into isolated zones using tools like AWS Security Groups, AWS Virtual Private Cloud (VPC), and Terraform-based infrastructure-as-code. This layered approach limits lateral movement and improves isolation.
Intrusion Detection & Prevention
Files.com deploys Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) across its environment. These systems monitor for suspicious activity and enforce automated rules to mitigate threats.
Technologies used include:
- AWS GuardDuty: Detects abnormal behaviors across AWS resources.
- ModSecurity: A Web Application Firewall (WAF) that protects against common web exploits.
Brute Force Protection
Files.com automatically monitors and limits suspicious login attempts to block brute force attacks before they gain traction. Protections are built into our broader intrusion detection systems using tools like AWS GuardDuty and ModSecurity.
Outbound Connectivity Controls
Most internal systems are restricted from making outbound internet connections. Limited exceptions include systems that:
- Sync with third-party storage providers
- Mount remote storage
- Initiate file transfers via the internet
Wherever possible, outbound connections are routed through proxy servers for added security and monitoring.
Customer Connectivity & Responsibility
Files.com does not initiate outbound connections to customer systems unless explicitly configured by the customer.
Customers may choose to enable features like:
- LDAP or SSO integrations
- Remote sync and mount connections
- Webhooks
Configuration of these features is the responsibility of the customer. For more information, see the Files.com Shared Responsibility Model.
Virus & Malware Protection
Files stored within Files.com are not scanned for viruses or malware by default. Customers are responsible for implementing any end-user file scanning controls.
Files.com does implement malware protection at the infrastructure level:
- Servers are monitored using AWS GuardDuty with malware detection enabled.
- Company laptops are protected with CrowdStrike Falcon endpoint security software.
- All internal servers include Wazuh agents for File Integrity Monitoring (FIM), which scan for unauthorized software or configuration changes and report findings to a central monitoring system.
Email Scanning & Security
Files.com does not scan emails sent from the platform for malware, spam, or sensitive content. Customers are responsible for ensuring appropriate safeguards when using email-based features.