Trust Center

Start your security review
View & download sensitive information
Ask for information
ControlK

Welcome to Fruition's Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this Trust Center to learn about our security posture and request access to our security documentation.

Documents

REPORTSOther Reports
Trust Center Updates

Hardened Images Now Standard

Copy link
Vulnerabilities

Fruition has rolled out hardened zero CVE images for select use cases.

SOC 2 Type 2 and ISO 27001:2022

Compliance

We are pleased to announce that Fruition has obtained our ISO 27001:2022 and SOC 2 Type Certifications.

Fruition further elected to follow NIST AI-RMF and NIST CSF Frameworks.

Fruition Does Not Use Polyfill

Vulnerabilities

No client impact notice - Polyfill.io, a domain used by more than 110,000 websites to deliver javascript code, has been used for a supply chain attack, potentially leading to data theft and clickjacking attacks. This story has been covered on several national news sites which in turn has generated a few questions from client's CISOs. This is an important story for main stream media to cover. We're glad that supply chain attacks are becoming better understood. Fruition has never used Polyfill thus no Fruition clients have been impacted.

Supply chain attacks are very serious and high on Fruition's radar. We mitigate supply chain risk via scans of every layer of the Docker images used to build sites. As always feel free to reach out if you would like more information.

CVE-2024-3094

Vulnerabilities

All k8s nodes have SSH disabled (default).

GitLab (https://git.fruition.net) has confirmed that they do not use xz-utils. (Official statement)

Our Base Docker images (all our sites are built off a common set of images IE fruition/fruition-internal-base-images) are not running an SSH server so they are unaffected.

We have run scans on all images that we use and have not found any image with this CVE.

CVE-2023-32193 - Rancher

Vulnerabilities

A vulnerability has been identified in which unauthenticated cross-site scripting (XSS) in Norman's public API endpoint can be exploited. This can lead to an attacker exploiting the vulnerability to trigger JavaScript code and execute commands remotely.

The attack vector was identified as a Reflected XSS.

Norman API propagates malicious payloads from user input to the UI, which renders the output. For example, a malicious URL gets rendered into a script that is executed on a page.

Fruition patched this vulnerability within 12 hours of the release.

Built onSafeBase by Drata Logo