Search Unity

Unity's version control component has been upgraded to Plastic SCM.

Safety of projects in Collaborate

Discussion in 'Unity Collaborate' started by JohnRossitter, May 16, 2017.

  1. JohnRossitter

    JohnRossitter

    Joined:
    Dec 18, 2013
    Posts:
    1,027
    I know this is a hot button topic in the state of the world we live in, but I think its worth discussion here.
    With all of the recent breaches in big companies like Netlix and Disney where intruder have broken in and stolen and then offered a ransom on unreleased properties, I wanted to ask how Unity is protecting access to our Game projects in collaborate?

    Can someone from the security group chime in and explain how you are safeguarding all of the information stored in our repositories?

    One potential vulnerability that bothers me is the ability to just add anyone to a project as a team member.

    Just to be clear, I am NOT saying that there is a problem here, I'm just curious what procedures are in place to protect our projects.

    Thanks,
    John
     
    sbrantl likes this.
  2. richard-lee

    richard-lee

    Unity Technologies

    Joined:
    Jul 14, 2015
    Posts:
    50
    Hi. We don't have an official FAQ for security questions yet. Until then:

    Account Access. This is not data technically stored with your repository but should be mentioned. I can't talk too specifically about what we're doing in Unity ID other than we're continuing to make it more secure. On the front end, we've recently added 2FA to add an additional layer of security to accounts (works with your phone).

    Project Access. Access to your the project can be added/revoked at any time, to those with a UnityID. Of course, because clients download assets to their local machine, they can retain versions of project separately. We'll likely add features to give more granular control over a project e.g. read only, write to only certain parts of a project, etc.

    I don't understand the concern that "One potential vulnerability that bothers me is the ability to just add anyone to a project as a team member." What is driving the current experience is that we expect customers want few road blocks to working with others; so, it's easy. If it's too easy, there are enough roles / privileges provided today to limit the number of users who can grant project access e.g. only have one "Owner" in your org.

    Data. Encrypted in transit. In the future, possibly at rest too, as an option. The issue is it WILL result in a performance hit, but very unlikely to make things more secure e.g. if it was a h4x0r, it would be easier for me to steal a password than physically break into a world class datacenter (so enable that 2FA!)

    Additionally, we don't look at project data unless a customer gives us very explicit permission. This privilege is extremely limited; used to address support issues. In addition to people policies to limit access, there's also application policies.

    Security Testing. We audit on a regular basis. Not providing details here on purpose

    Hope this helps. Let me know if there’s something missing; will help us draft the actual FAQ
     
    JohnRossitter likes this.
  3. JohnRossitter

    JohnRossitter

    Joined:
    Dec 18, 2013
    Posts:
    1,027
    Hi Richard, thanks for the reply.
    Well my worry is that the Unity Unified ID system could be compromised and then someone could log into my team services and grant themselves access to my code via the collaborate team members tool.
    I suppose it is a long shot that it could happen though.

    I'm glad to hear that the data is encrypted in transit, so the project data that is stored in the servers is encrypted?
    That would make me feel a whole lot better knowing someone could not access the raw storage or have some mastr key to decrypt the data and just take whatever they like.
     
  4. richard-lee

    richard-lee

    Unity Technologies

    Joined:
    Jul 14, 2015
    Posts:
    50
    To your first point, I've talked with Unity users that don't like any cloud solution because of this inherent risk. To some, a more secure solution is to keep an onsite disk in a closet. Both have risks and costs.

    Encryption in transit does not automatically mean its encrypted at rest. As mentioned, we currently do not encrypt at rest. It has a necessary impact on performance but doesn't necessarily make things more secure. This might seem odd but it's not out of the ordinary for cloud based services (e.g. GitHub). Encryption at rest helps mitigate physical compromise but other vectors are way more likely.
     
    JohnRossitter likes this.
  5. JohnRossitter

    JohnRossitter

    Joined:
    Dec 18, 2013
    Posts:
    1,027
    OK, So the raw storage on the Collaborate system is not encrypted.
    How is that store being protected?
     
  6. richard-lee

    richard-lee

    Unity Technologies

    Joined:
    Jul 14, 2015
    Posts:
    50
    Right now, you could probably figure out that we store stuff on AWS. So,

    https://d0.awsstatic.com/whitepapers/Security/AWS_Security_Whitepaper.pdf

    Section that is relevant to this conversation

    Physical and Environmental Security

    AWS’s data centers are state of the art, utilizing innovative architectural and engineering approaches. Amazon has many years of experience in designing, constructing, and operating large-scale data centers. This experience has been applied to the AWS platform and infrastructure. AWS data centers are housed in nondescript facilities. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication a minimum of two times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.

    AWS only provides data center access and information to employees and contractors who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, his or her access is immediately revoked, even if they continue to be an employee of Amazon or Amazon Web Services. All physical access to data centers by AWS employees is logged and audited routinely.​
     
    Deleted User likes this.
  7. JohnRossitter

    JohnRossitter

    Joined:
    Dec 18, 2013
    Posts:
    1,027
    Yeah I knew it was all AWS, which is great.
    Thanks for sharing that.
     
  8. bjornsyse

    bjornsyse

    Joined:
    Mar 28, 2017
    Posts:
    102
    Any updates on this matter, Is there a security FAQ somehwere? You still use AWS for cloud storage?
     
  9. StaceyH

    StaceyH

    Administrator

    Joined:
    Apr 11, 2018
    Posts:
    44
    We do not yet have an update to our FAQ. For the time being, we recommend that anyone who has questions on the security of Collaborate reach out to us via collabsupport@unity3d.com to discuss.