alyna

🔒 Our commitment to security and privacy

Alyna is a powerful tool for product engineering teams, but it cannot provide value without accessing data from Jira boards and Github PRs. Code is every software engineer's most important Intellectual Property, and roadmap items could be a company's most confidential information. We at Alyna are committed to securing user data and being transparent about the usage of collected data.

Without legal-ese, what does this mean specifically? It mainly boils down to four things:

1
We ask for the minimum amount of data needed to provide our service, as detailed in the Data Access section. For instance, we require access to PRs for most features, but not the entire repo.
2
All our sub-data processors meet the most stringent data security and compliance standards, including SOC2, ISO 27001, CCPA, GDPR, and even HIPAA.
3
We do not store any of your data (code snippets, Jira tickets, etc.) whatsoever; the only thing we store is the LLM output for product improvement.
4
We securely transmit your data to OpenAI via its API, which does not use the data for any purpose (e.g. training or improving the models) other than generating outputs. All data is removed after 30 days, and we are in the process of acquiring Zero Data Retention policy.

To make sure that our team has the bandwidth to deliver the best product while ensuring we are airtight on the security front, we are leveraging the industry leading services from Vercel (frontend cloud), Supabase (database), and OpenAI (LLM).

System Architecture

security-overview

MFA

Access to all internal systems is protected by multi-factor authentication. Access is restricted to those who require it to perform their job, and is regularly reviewed and revoked upon termination or when no longer needed.

Code Reviews

Code reviews are mandatory for all code changes to our product. Security-sensitive changes are additionally reviewed by security advisors before being released.

Testing

End-to-end tests to validate authentication and other critical workflows (such as authorization and authentication).

Client Secrets

We do not store sensitive keys and passwords in our code, instead relying on a secure secret vault.

Data Security

API Protection

APIs are secured using API keys, and access is restricted based on user roles. Regular security audits are conducted to identify and address vulnerabilities.

Identity Verification

Identity verification is performed using JWT tokens in the web application to ensure secure communication. Slack header signature is utilized to verify the identity of incoming requests from Slack.

Encryption

All customer data is encrypted at REST with AES-256 and in transit via TLS. Sensitive information like access tokens and keys are encrypted at the application level before they are stored in the database.

Network Security

All infrastructure is hosted on Vercel.

Firewall

Alyna leverages Vercel’s firewall which is configured to allow only necessary traffic. Rules are regularly reviewed and updated to mitigate potential threats.

DDoS protection

Vercel firewall blocks incoming traffic if it hits abnormal or suspicious levels of incoming requests.

VendorSec

Vendor security is crucial for safeguarding our systems; we rigorously assess and ensure our vendors adhere to industry standards, implement robust security measures, and maintain open communication channels to uphold a resilient and secure business environment.

CI system

Continuous integration pipelines include security checks to identify and address vulnerabilities in the codebase.

Data Storage

We leveraged the state of the art infrastructure at Supabase for data storage.

Backup

All customer databases are backed up every day. Point in Time Recovery allows restoring the database to any point in time.

Encryption

Sensitive information like PII and tokens are identified, classified, and stored securely. Access to the information is restricted, and encryption is applied during transmission and storage using pgsodium, which is a PostgreSQL extension which provides SQL access to libsodium's high-level cryptographic algorithms.

Data Access

Alyna requires data from various sources for the provisioning of services. The details are as follows:

SourceData TypeAccess TypeRelated FeaturesPurpose
JiraJira-user (user name, email, avatar)ReadStandup Helper, Sprint Summary, and Status UpdateTo find relevant info pertaining to specific users
Jira-work (project, issue date, attachments, worklog)ReadStandup Helper, Sprint Summary, and Status UpdateTo provide the context for engineering tasks
Jira-workWriteLinkTo post slack summaries in the comment section of a Jira ticket
GitHubMetadata(including title, description, author, branch info, label, status, reviewer, review status, comments, timeline, activities, changes introduced)ReadAll featuresTo provide precise summaries of developer activities
Pull RequestsReadAll featuresTo provide precise summaries of developer activities
SlackPublic channels, private channels, direct messages, and group direct message (messages, content)ReadSprint SummaryIdentify challenges
Workspace (user, email)ReadAll featuresIdentify pertinent users in slack summaries
Public channels, private channels, direct messages, and group direct messageWriteAll featuresSend messages as Alyna
WorkspaceWriteAll featuresTo perform action in your workspace, i.e. to trigger the Alyna command

Account Management

Creation

Company employees and contractors are provided with user accounts through our internal account management system (G Suite). Account creation requires valid employee/contractor identification and approval from the HR department.

Management

User accounts for employees and contractors are managed through an internal admin panel accessible to authorized personnel. Account permissions are assigned based on job roles and responsibilities.

Deletion

The secure deletion process is followed by administrators when an employee or contractor leaves the company or no longer requires access.

Password manager

Employees and contractors are required to use open source password manager to generate and store complex passwords securely.

Biometrics lock

Employees and contractors can enable biometric locks on devices supporting fingerprint or facial recognition.

© 2024 Alyna Technologies Inc. All rights reserved
TermsPrivacy Policy