#f5f5f5

Learn about our ongoing efforts.

Better detection and prevention rules

Robust security infrastructure.

We deploy and maintain a robust platform stack of security infrastructure technologies developed by both trusted partners and our internal teams. We leverage automation throughout this stack to enable consistency in our security controls across all our products and services. We share many of the custom tools we’ve developed as open source to help the broader security community learn from our efforts.

Detection and prosecution

Constantly watching for issues.

Our operations team, including our Adobe Cyber Defense Center, uses a set of monitoring alert criteria to define the critical security and availability standards for our services' production environments. They use third-party and internally developed monitoring and analysis tools to closely monitor any unusual activity.

Preventing product fraud

Restricting access.

Role-based access is used to restrict privileged access to information resources based on the concept of least privilege. Authorization requires approval by the management directly responsible for the confidentiality, integrity, and availability of impacted resources.

Fraud education

Keeping our solutions humming.

We implement a comprehensive change management process to help check that changes to the network or production environment are documented, tracked, tested, authorized, and approved prior to migration to production. We monitor the states of the hardware, operating system, and configurations, and we log and execute changes in a controlled way.

Resources

Picture

Dive deeper.

Learn more about operational security platform and our automation efforts on our blog.

Read more in our blog