Defending our infrastructure
from security breaches
Your online security is always a priority at PureVPN.
Check out the security practices we follow, and the validation/testing practices we employ
to keep your data secure at all times.
1. Account and access control
PureVPN’s infrastructure is equipped with a strong authentication mechanism at every level. Our VPN servers’ access is maintained via a centralized access manager, where the access request is assessed and, if approved, issues time-bound access with a one-time password (OTP). Our code repo is also authorized via Multi-Factor Authentication. IP whitelisting is mandatory for any access to our infrastructure.
2. Application software security
Our engineering process entails security assessment from Epic / Grooming phase until it goes live. The code review process follows the ‘four-eye’ principle where a review is performed by multiple teams prior to merging in release and master branches. A security scanning tool for static code assessment is integrated into continuous integration (CI) process and identified bugs are fixed prior to rollout in production. Additionally, a reputable third party is brought on to perform application security assessments using advanced testing methodologies.
To ensure that there is no traffic leakage from the VPN tunnel, PureVPN has developed open-source tools to test the leakages. These are readily available on our website.
The components of client-side applications running in privilege mode for required functionality, like adding firewall rules, etc., are secured using memory protection, strong authentication, and allowing only permissible actions to non-privileged users.
3. Continuous vulnerability management
We have implemented an automated vulnerability management program wherein weekly scans are performed and reported vulnerabilities are fixed. Any ad hoc vulnerability reported at random is tested and fixed across the infrastructure in minimal time. Our employees are subscribed to CVE announcements for all in-production software to support the Vulnerability Management Program. Additionally, policy compliance scans are also scheduled to continuously monitor security baseline configurations.
4. Network monitoring and defense
We have implemented an intrusion detection and prevention system on our infrastructure and cloud assets to mitigate attacks and get alerted of potentially malicious events in a timely fashion. Traffic is routed via a Web Application Firewall to mitigate platform attacks like DDoS, web application attacks, and so on.
5. Penetration testing
PureVPN has implemented a penetration testing program in multiple folds. Employees are assigned to penetrate our infrastructure and apps during engineering streams. A reputable third-party firm is then brought onboard to test all platforms.
6. Secure configuration of assets
At PureVPN, the deployment of applications and infrastructure is fully automated, removing the human element from the process. International security benchmarks are part of the security baseline configuration enforced at PureVPN. Hardened images are deployed using an automated configuration management tool.
All firewalls are configured to deny traffic by default and only authorized protocols and intended traffic is allowed after the change assessment process.
Where applicable, the dedicated workstation is used to access production systems hardened for specific tasks. This enables us to provide the best services to our users with embedded quality and security assurance. All services and operations run under the least privileged model to reduce the attack surface.
Monitoring agents are part of the configuration baseline to ensure automated compliance and integrity of critical files.
We have segregated web architecture. Our website servers do not host any data nor do they have any direct access to databases. Interaction is built using best practices by implementing API gateways with limited exposure to only intended data views. Attack surface is further reduced by allowing limited consumer interaction with business logic.
7. Endpoint security
Users are not authorized to export any consumer’s personally identifiable information. A device security policy is applied on user systems with predefined hardened images.
Endpoint security control is implemented to mitigate the spread of malware and attacks on host systems. Strict URL monitoring is implemented to ensure that even potentially malicious sites are blocked.
Systems are patched periodically via an automated tool. Host-based network firewalls, intrusion detection and prevention systems, security baseline benchmarking, application control, restricted removable storage access, privilege ID control, and continuous host monitoring via centralized solution are key highlights of endpoint security.
8. Security awareness and training
All staff, including employees and contractors, are part of the PureVPN security awareness program right from the time they join the company till they advance for opportunities outside PureVPN. We ensure that all our employees and contractors understand security requirements at PureVPN and that cybersecurity is a crucial part of their work philosophy.
Since we deal with global customers, we make it a point that our employees, suppliers, and contractors understand the importance of cybersecurity measures to protect their data. We always screen our employees and contractors against human and technical security requirements, including security clearance of employees, and third-party security compliance certificates for vendors and partners.
1. We do not log data that can identify you
Outside contractors from KPMG certified us as a “no-log” VPN Service Provider.
They randomly check in with us to make sure we are not logging any VPN data from our customers.
What does “no-log” mean for you?
It means we do not store any of the data you make when you use PureVPN.
We can’t see what you do online or link back to you at all.
To find out more about how KPMG evaluates PureVPN, you can read this article:
PureVPN Excels KPMG’s Always-On Audit Setting an Industry Benchmark
When you get customer support, our Customer Success Agents can only access your account by using a pre-approved IP address, and verifying their identity through Multi-Factor Authentication (MFA).
We use a third-party payments provider to process your subscription to PureVPN, so we can’t see any of your credit card details or payment information.
2. PureVPN lives in a country that doesn’t require data storage
In 2021, we moved the legal jurisdiction of PureVPN to the British Virgin Islands.
Because of this, we are not legally required to store any kind of data.
To find out more about why we moved our headquarters, you can read this article:
3. We still have rules to follow – with consequences for breaking them
The GDPR (General Data Protection Regulation) is a set of rules that require all businesses to protect the personal data of the people who use their online services and resources.
We are required by law to follow these rules, which include asking your consent to share any of your PureVPN customer data with third parties.
If we don’t, we could get into serious trouble.
These rules began in 2018, and we have made sure that PureVPN follows them since they came into effect.
4. We have quantum computers to generate powerful encryption keys
These keys are called “Quantum-Resistant Encryption Keys”.
They protect you while you’re using PureVPN because they help prevent cyber threats, like someone getting your password through a Brute Force attack.
Right now this extra (not necessary, but future-thinking) layer of PureVPN protection is only available for you if you are in one of these areas:
We are working on getting this feature to you, no matter where you use PureVPN.
Here’s how we handle the tough stuff
We are building a safer, more equitable internet for us all.
That means being honest with you about how we navigate the hard things; like emergencies or intellectual property.
To get all of our transparency reports, just click the “See all reports” button below.
Can law enforcement request my data?
Yes, law enforcement agencies can request anyone’s data.
However, we do not store any data that can directly identify you.
- 1. We have not received any court orders.
- 2. We have not received any subpoenas
- 3. We have not received any emergency disclosure reports
You can check this page every month to see if we have received any requests from law enforcement.
Who keeps PureVPN accountable?
We always have someone from outside of PureVPN watching how we conduct ourselves.
Doing this protects the integrity of PureVPN so we can keep providing you a uniquly safe and private VPN experience.
We are a member of
i2C’s VPN Trust
We’ve aligned with I2C’s VPN Trust Initiative Coalition to champion a safer digital landscape.
As part of the VPN Trust Initiative (VTI), we’re
at the forefront of enhancing online security,
fostering trust, and building understanding
for all VPN users. Join us on the path to a
safer Internet, where security and trust converge seamlessly.
Discover more about our commitment and the VTI’s impact by delving into this article:
PureVPN’s no logs policy
verified by a top auditor
for the fourth time
We’ve established an industry benchmark through
our fourth consecutive no-log policy assessment by
a prominent audit firm. This recent technical
evaluation covered VPN servers, configurations, and
supporting infrastructure across multiple locations.
Our commitment to user transparency and data protection remains unwavering. To uphold this pledge, we voluntarily
undergo periodic, independent technical assessments to
Find out what real people
say about PureVPN
Try PureVPN risk-free for 31 days
If you don’t love PureVPN, let us know within your first 31 days.
We’ll send you a full refund.