ZoomInfo Security Overview.

1. Introduction

ZoomInfo is a Vancouver, Washington-based software company providing subscription-based SaaS services to over 30,000 companies worldwide. For 20 years, ZoomInfo has assisted companies in achieving profitable growth. ZoomInfo assists its clients in identifying ideal prospects and decision-makers within their target market.

2. Our Commitment to Security

ZoomInfo is a security-first organization committed to protecting our information from intentional or unintentional misuse. This includes customer, partner, vendor, and other third-party information. In this spirit, ZoomInfo is proud to have implemented a robust Information Security Management System (“ISMS”) that meets the strict guidelines of the ISO 27001 Standard. We have also earned AICPA’s SOC2 attestation regarding the security, availability, and confidentiality controls around our services. Our ISMS includes within it the Risk Management program formally based on the ISO 31000 Risk Management Framework.

ZoomInfo complements its security team’s expertise with industry-best tools and third-party services. These services include assessments, controls reviews, technical reviews, and testing. Tools are integrated into our process lifecycle, and we employ various continuous control monitoring functions throughout our environment. In addition, we have additional supplementary security protections in place to deflect and thwart exploitation attempts.

As part of our security framework, we carefully review our service providers’ security practices, requiring appropriate certifications which may include SOC 2 Type II, ISO 27001, PCI DSS, HIPAA, and CSA-STAR, and perform an analysis of control to ensure we manage third party risks to ZoomInfo.

3. Security Fundamentals

Our risk management and compliance framework provide the basis for our information security program. The core of the program is defined by our ISMS and serves to assess, manage, monitor, and minimize our information security risks. The program includes:

  • Context of the Organization
  • Leadership
  • Planning
  • Support
  • Operation
  • Performance evaluation
  • Improvement

The ISMS provides the structure from within which we perform the various tasks required to maintain and refine the program. It consists of a set of policies and procedures that help ZoomInfo formally and systematically manage our sensitive information. These policies and procedures address the risks related to who has access to our information, the processes in which they handle that data, and the technology employed to manipulate it. It affects the way people work and how they behave. Proper employee conduct in handling sensitive information is reinforced by a dynamic information security awareness education and professional security training at the functional level. Our awareness training function provides consistent instruction that not only influences the behavior of the individual, but also serves to influence the ZoomInfo corporate culture ensuring the progression to a single, more security-conscious global corporate entity.

4. Security Team

Our information security team is comprised of diverse group of seasoned security veterans with experience managing all facets of information risk including Data governance, Compliance, Risk management, cyber threat intelligence, Breach Readiness, Cyber Security Operations Center (CSCO), Security Engineering and Offensive security. Members of our team hold certifications including Certified Information Systems Security Professional (CISSP), Certified Information Systems Management (CISM) and Certified Information Systems Auditor (CISA). Moreover, ZoomInfo boasts strong working relationships with the academic and government strata. The Security staff participates in continuing education and training throughout the year ensuring we are implementing ever-evolving best practices.

Our information security policy outlines the roles and responsibilities within the organization, and our security team works directly with specific members of senior management we call “security partners” to ensure that the various information security directives are executed as required in their respective departments. Our security partners help to establish, assess, and enhance business processes by ensuring the required information security risk management practices are suitably embedded within their respective processes.

5. Risk Management

ZoomInfo’s ISMS implementation allows for the appropriate integration of security processes and controls into the existing or newly created processes. This enables security to be part of a process and not an afterthought. Appropriate metrics are provided to executive leadership for effective management of risk and improvement of controls. ZoomInfo’s risk management platform is anchored to the ISO 31000 Risk Management Standard, and continuous risk assessment activities are conducted in partnership and coordination with risk owners affiliated with the various ZoomInfo business units.

6. Our Staff and Internal Operations

All of our employees are vetted and subjected to background checks or equivalent (based on country laws and practices) prior to hiring. Employees are scrutinized not only on previous experience, but also on how well they fit into the overall corporate culture. Current employees are required to participate in continuous and dynamic awareness training that is designed to develop and maintain a security-focused culture. The training program seeks to empower our employees and consultants to make responsible, secure decisions and to protect our most valuable assets. We employ a variety of tools, techniques, and programs to embed security into our professional and personal lives. 

All employees and contractors are required to successfully complete an annual, interactive security training program that includes an overview of key security topics, policies and responsibilities, and all new employees are required to complete this training shortly after their onboarding.

Specialized staff such as developers and security personnel undertake additional training specific to their roles. Additionally, all employees and relevant contractors are required to review and acknowledge our information security policies, including our Code of Conduct and Acceptable Usage Policy.

Consistent and repetitive interaction with our user base is an integral part of our security awareness initiative. The message that “security is part of everything we do” is driven home by numerous information streams. Regular security bulletins are disseminated across all spheres of the organization with tips and best practices, external security resources, emergency response information, security alerts, awareness information, security procedures, and contact information for associates and contractors to ask security-related questions or raise concerns.

7. Prevention

Preventative security is an important part of ZoomInfo’s layered approach to security.

  • Critical Assets
  • Data Protection 
  • Application Protection 
  • Cloud Security
  • Network Security
  • End Point Devices
  • Perimeter Defense
  • Physical Protection

Key to our incident prevention strategy is identifying what data we need to protect, where that data resides, and who requires access. Information assets include data that has value to our business, including business intelligence, customer data, passwords, keys, etc. Such assets are protected in part by appropriately provisioning access based on the needs of the specific job function or role.

7.1 Data Protection and Encryption

Customer access is protected with Multi-Factor Authentication (MFA) and/or Single Sign On (SSO). Customer data is encrypted at rest using AES256 and browser client communication is encrypted with a minimum of Transport Layer Security (TLS 1.2). Passwords are stored with a SHA256 salted hash format.

7.2 Network and Infrastructure

Our services are hosted on the three major cloud providers with hosting data centers in the U.S. 

Our use of automation throughout our operations minimizes the need for “human touch” to critical systems and data, further minimizing risk vectors. Within these cloud providers we use multi-layered security from the layered application architecture and the firewall functions the cloud providers make available.

We also use third-party providers of Web Application Firewalls, internet facing protection, and DDOS protection, along with BOT. These services and our corporate environments are also protected with gateway devices with limited local computing services.

7.3 Host and End Point

Our corporate systems are heterogeneous for the purpose of maximum productivity, and include Linux, Mac, and Windows. Critical systems are centrally controlled and monitored. End Point devices have layered security including state of the art malware and incident detection and response. End Point devices are patched at regular intervals along with operating system and applications updates.

7.4 Partners and Vendor Risk

Our cloud services partners have strong security controls in place for managing all aspects of security and meet each of our rigorous requirements. They also provide security services for their user base allowing ZoomInfo to collect, manage, and respond effectively to alerted security events. These events can also be forwarded to the ZoomInfo Security Information Event Management (SIEM) tool for analysis and investigation as part of ZoomInfo’s Cyber Security Operations Center.

We have a full risk assessment program in place to review prospective vendors. The vendor risk assessment includes evaluating the risks each vendor poses to us and, based on that assessment, outlining mitigation efforts on vendors that complete the process.

7.5 Identity and Access Control

Single sign-on and multi-factor authentication are used extensively throughout ZoomInfo. Testing and production systems have additional, highly granular controls to ensure that only approved access is granted. Our Cyber Security Operations Center operates 24/7 and is responsible for implementing extensive monitoring, logging, and anomaly alerting for access and related activity. Application and system controls are subject to independent audits on a rotating basis.

Access is driven by either ZoomInfo’s on-boarding process or an individual request through the helpdesk ticket system. 

7.6 System Development Life Cycle and Application Security

ZoomInfo applications are designed, developed, and deployed including processes and workflows, with security in mind at each step. In design, the Cloud Security Alliance and ISO principles are applied as needed. In development, both new and modified code are subjected to code analysis before being promoted to production. Developed code is put through a standard automation process after it has been thoroughly vetted by our QA, code testing, user acceptance, and security reviews.

ZoomInfo has multiple protections in place between the user’s browser and our applications, to address potential attacks before they ever reach our environments. A dedicated fraud and abuse team monitors for anomalous application access or usage.

Our Continuous Delivery and Continuous Deployment (CI/CD) systems are built on a software-defined infrastructure. When human intervention is required, activity is logged and monitored for additional protection against any possible insider threat.

7.7 Malware

Our corporate offices employ numerous levels of physical security, including badged, monitored, and secured entry.

As to our system infrastructure, each of our cloud service providers employs best-of-breed physical security. The physical media underlying the cloud service is handled by the provider, at their data centers, on their physical systems, and protected by extensive security and process controls that provide a very high level of data security.

8. Detection

8.1 Threat Detection and Analysis

All systems, from a user’s system to our production servers, are protected with a best-in-class endpoint protection system that employs best practice cyber threat detection and prevention modalities. These systems report to a central monitoring portal and alert or block unusual activity. Any system showing anomalous behavior can be remotely disconnected from the network to prevent lateral spread.

8.2 Threat Detection and Analysis

Defensive layers at the edge include Distributed Denial of Service (DDOS), Web Application Firewall (WAF), Firewalls, Network Intrusion, Intrusion prevention, OWASP based filters, Access Control lists (ACL), and agents on endpoint nodes. All these feed into centralized management, where alerts are automatically and/or manually addressed, and threats suppressed.

8.3 Logging and Monitoring

ZoomInfo has logging in place for performance, operations, and security related events. Logs are held for 90 days for most systems and stored where necessary for over a year. Dedicated teams are responsible for monitoring and reacting promptly to events such as anomalies, service degradation, or security incidents.

For events that are not the norm, ZoomInfo has a formal incident management process with training and testing for this team being held. These include callout processes or simulation events.

8.4 Fraud and Abuse Detection

ZoomInfo also has a dedicated fraud and abuse team continually observing defined thresholds for application activity to detect and report unwanted action in real time. Using custom-built tools, this team of application and product management experts respond to events in real time to prevent and respond to anomalous activities.

8.5 Bug Bounty Program

ZoomInfo accepts reporting of flaws in our perimeter security by ethical hackers that report on such weaknesses and vulnerabilities.

9. Response

ZoomInfo has well-defined response plans to address different events at the appropriate level within the organization.

9.1 Incident Management

ZoomInfo’s incident response playbooks outline our response if our production services are impacted. This process is for managing an incident and is defined. If the impact is beyond that of the defined incident, the Global Crisis Management process is initiated as discussed below.

A thorough process enables quick response from the incident management team that can engage the right incident response teams. The process outlines concise steps required to initiate and manage the incident, post-incident, process maintenance, and root cause analysis protocols.

Successful incident response relies on more than simply detecting and responding to security incidents. ZoomInfo’s incident response program is built on assessment, plan initiation, containment,

eradication and recovery, and post-incident activities. These are supported by plan maintenance activities, including training, testing, and simulation.

9.2 Crisis Management

The Global Crisis Management process outlines our response to certain events that could have a significant impact on our employees, customers, investors, or the general operations of the company, including service interruptions, reputational harm, shifting market forces, or change in governmental policy or regulation.

The process outlines concise steps required to initiate and manage the crisis, including post-crisis, process maintenance, and root cause analysis protocols.

ZoomInfo addresses crises by defining a formal process. The overall responsibility for any crisis resides with the Crisis Management Team (“CMT”). The CMT manages all types of crises including corporate crises, data breaches, customer crises, and business continuity issues.

9.3 Business Continuity Plan

ZoomInfo has taken steps to create a redundant and robust infrastructure and application environment. This includes offices, third party service providers, robust cloud providers with multiple high availability zones across disparate regions.

10. Certification and Controls

ZoomInfo has multiple certifications, attestations and compliance which is monitored and managed by our Governance Risk and Compliance (GRC) team.

10.1 Controls

In accordance with the values promulgated by ZoomInfo’s Board of Directors and senior management, ZoomInfo’s primary objective in its approach to internal control is to provide reasonable assurance that its controls are suitably designed, implemented, and operating effectively to meet system, security, and compliance requirements. The control structure is focused on ensuring that assets are protected from unauthorized use or disposition, and that processes and procedures are in line with our strategic goals and are executed with senior management authorization.

Networks, systems, and application aspects are regularly scanned. Any critical vulnerabilities are addressed upon discovery.

10.2 Certifications and Attestations 

ZoomInfo is ISO 27001, ISO 27701, TRUSTe, and SOC 2 Type II certified.

11. Remediation

ZoomInfo takes a proactive approach to security and quickly addresses risks. When a weakness is found, a risk review is performed, a risk level assigned, and the risk addressed with a priority based on impact.

11.1 Vulnerability and Patch Management

To maintain a secure environment, ZoomInfo has an established vulnerability testing schedule, with results reported into our Agile task tracking software, assigned a criticality and priority, and addressed through our development life cycle processes.

11.2 Risk Tracking

In addition to managing risk through established protocols and processes, we also maintain a risk register to capture actual or potential risks not amenable to discovery through automated methods. Entries here are reviewed by executives for relevance, potential severity and risk, and acted upon accordingly.

12. Contact Us:

Contact us regarding security-related questions through our sales representatives, or your account manager if you are already a client. Any questions on security sent to them will be routed internally and they will reply with the answers.
Should you need to contact us regarding an actual or potential security issue, such as receiving a phishing email purporting to be from ZoomInfo, bugs, or any other security concern, please let us know by contacting us at security@zoominfo.com, and thank you in advance!