Start your security review
Search items
We know source code is one of your most sensitive assets. Every component of Sourcegraph was designed with security as our top priority. This Trust Center details our comprehensive security program, where you can find information and request access to documents to validate our security measures.
Security is woven into the fabric of everything we build at Sourcegraph. Our code intelligence platform demonstrates our continued commitment to empowering developers with the tools for your devs to do their best work while safeguarding what matters most—your source code.
Documents
Featured Documents
Knowledge Base (FAQ)
Is there a way to block all non-permissive code (copyrighted code) from being suggested by Cody?
A procedure for emergency changes shall be defined and established to manage different situations with a specific time frame with short deadline.
Although changes made under emergency procedures are often the result of inadequate planning, they are sometimes unavoidable. Any service interruption that is classed as high impact, either on account of the number of users affected or because systecustomer or services that are critical to the organisation are involved, must be responded to immediately. The solution to the problem frequently requires a change, and this has to be carried out following emergency procedures.
In these procedures;
- it is common to follow reverse order compared to usual, i.e. the CMDB is recorded and the associated documentation completed after the change has been made.
- changes may require an urgent meeting of the CAB and or EC, if possible.
- changes may require a decision by the change manager if it is possible to postpone problem resolution or if it occurs over a weekend or during the holidays (making it difficult for the EC to meet).
- changes follow established validation protocols to validate urgent changes.
- the same information is available afterwards as would be in the case of a normal change.
Do you provide antivirus services to protect your critical systecustomer and data?
SECURITY - Are processes, procedures, and technical measures defined, implemented, and
evaluated to ensure personal data is processed (per applicable laws and regulations
and for the purposes declared to the data subject)?
SECURITY - Are processes, procedures, and technical measures defined, implemented, and
evaluated for the transfer and sub-processing of personal data within the service
supply chain (according to any applicable laws and regulations)?
View more
If you think you may have discovered a vulnerability, please send us a note.