Vanta’s 6 principles for pragmatic startup security

Vanta’s 6 principles for pragmatic startup security

Building startups is hard; securing them can be downright confusing. There are a mess of standards, frameworks, consultants, and bloggers. Even YouTubers are competing to overwhelm you with advice.

There is often an underlying assumption that security should be the main concern of the startup founder and early engineers, but that’s not always the case. Security is a tool to protect your customers and your business, and a founder’s main concern is growing that business. That’s a good thing.

It usually takes several years for security jobs to appear at a new startup. In the beginning, it’s a shared responsibility of everyone working to build the business. With this in mind, Vanta has put together a set of tips for a more pragmatic startup security program. These are the things that should matter to your team on day one. They’ll not only improve your security, they’ll make it easier for your team to scale quickly and safely. If you’re wondering whether you’re behind the ball when it comes to your startup’s security, this list should help you close any gaps in the early stages of growth.

1. It’s easier to secure one thing than it is to secure many things

Use SSO everywhere you can 

Today there are a ton of SSO tools to choose from. If your team uses Google Workspace, you should sign in to everything you can with Google. The same idea applies to any other identity provider. This gives you the opportunity to securely configure one system and avoid inconsistent configurations, like multi-factor authentication (MFA), across different tools.

Write your infrastructure as code

Tools like Terraform or CloudFormation allow you to define your cloud infrastructure in code. This means changes can be peer reviewed and tracked in revision control repositories. This also means you don’t have to dig through dozens of dashboards to spot insecure configurations. Everything comes back to the source.

Consider Mobile Device Management (MDM)

MDM software manages the configuration of all of your employee laptops from a single tool. This lets you set up things like disk encryption, firewalls, screen locks, and installed software consistently across your whole fleet. If you’re not ready to deploy MDM software yet, you should try and centralize the process of setting up new employee machines as much as possible. This could be a simple shell script you have new employees run during onboarding.

Centralize CI/CD

Having a centralized deployment pipeline allows you to provide an easy “paved path” for engineers to deploy their code. If you’re asking everyone to SSH into production machines every day, you’re opening yourself up to more work, higher rates of human error, and a larger attack surface that needs to be secured.

2. Keep secrets secret

Get a password manager

Look into getting a team plan for a password manager. Your team will inevitably need to create, store, and share passwords to get their job done. If you want them to do so with minimal risk of using insecure passwords, and inadvertently leaking them, you want them to use a password manager. When someone joins your company, set them up with a license on your team plan to ensure effortless security.

Know your vendors

Vendor management can be a big rabbit hole, so keep this one simple. The goal here is to create a list all of the companies you share important things with, and to do some basic due diligence on those companies. You should set up a system to accomplish those goals with simplicity in mind. Here’s what an efficient system might look like:

  • You keep a spreadsheet called “Vendors”
  • Vendors that receive customer data or have some control over your production environment should be labeled “High” risk 
  • Label them “Medium” risk if they receive intellectual property or metadata about your customers (e.g. contract details, communications, etc.)
  • Label them “Low” risk if they’re only getting metadata about your company (e.g. a payroll provider)

For all High and Medium risk vendors, ask a few security questions before going forward with them:

  1. Who are the people responsible for your company’s security program? What are their roles/responsibilities?
  2. Have you had a security incident in the last three years? If so, please share what happened, how you responded, and what you changed as a result.
  3. What kind of tools are you using to secure your product and your company?

When they answer these questions, ask yourself “Do I trust these people with my customers’ data? Do I believe they will keep it safe?” When it comes to High risk vendors, ask for documentation as proof of their security. SOC 2 and ISO 27001 are commonly used to satisfy this query. It’s also normal to ask for their most recent penetration testing results. They’ll usually have a report ready for external distribution, but you’ll likely need to be under a non-disclosure agreement to acquire these documents.

3. It’s harder to hack two things than it is to hack one

Use MFA everywhere you can

Your team probably has a lot of accounts to manage for a variety of tools. Not all of them will support SSO. If you have to use a password somewhere, you should require a second factor as well. Passwords aren’t perfect, so having a good second authentication factor makes it incredibly unlikely that someone will gain unauthorized access. To really lock this down, avoid using SMS-based MFA. It’s known to be relatively easy to bypass in a targeted attack, because phone companies aren’t very resilient against SIM swapping attacks. Still, it’s better than nothing if it’s your only option.

Use protected branches

Source control hosts like GitHub and GitLab allow you to designate certain branches as protected and limit the circumstances under which code can be merged to them. Combined with a CI/CD pipeline, this can enforce secure workflows like requiring approval on a pull request before code can be merged to production. It also means that even if an engineer has some level of access taken over or abused by an attacker, they still have to get through an additional layer of protection before they can modify production code.

4. When software tells you it’s insecure, believe it

Update your browser and OS

When it comes to laptops, the most important software to keep up to date are your browser and operating system. These are going to be your biggest defenses against malware, and new security issues are regularly discovered in both types of software.

Update your infrastructure

On the server, the details depend on what your production environment looks like. If you rely heavily on containers, make it a point to use secure base images and do some basic scanning for known vulnerabilities in the software you use. On the server, you should update packages with known security vulnerabilities using something like “yum update --security”. You don’t have to go overboard here and desperately avoid using any out of date software, but set up your infrastructure to regularly move things forward, and try to avoid having software installed that you don’t need.

Note: This seems like a reasonable place to mention that your servers should only support TLS 1.2 and 1.3. All prior versions of TLS and SSL are considered insecure for various reasons at this point.

5. It’s better to find security bugs before the bad guys

Get an annual penetration test

The annual penetration test is a time-honored tradition in the information security world, and for good reason. The “bad guys” will be looking for security bugs, so you should have some “good guys” looking too. This can cost a bit of money, but the benefits of stronger security and your ability to sell to larger customers (if you’re in the B2B space) is invaluable.

There are almost certainly security bugs in your application. More will be introduced over time as well. Having professionals dig deep to find them each year greatly reduces the risk of a vulnerability being found and exploited by a malicious actor.

Create a means for responsible disclosure

There are many people who enjoy finding security bugs without any promise of compensation. If they come across something that looks suspect, they’ll dig in and report it. You can encourage this activity by promising rewards for good bugs with a bug bounty program, but for most early-stage startups this isn’t a high priority.

You should have a way for people to report bugs when they find them though. This can be as simple as setting up and making sure it gets routed to the right people. You might get a bit of spam, but you’d be amazed at what sorts of genuinely impressive security findings make their way into that inbox. Try to be courteous, calm, and collected with the people who submit findings.

Warning: Be wary of people reporting security bugs but demanding payment before sharing information. That’s not how these types of programs work.

6. It’s easier to see with your eyes open

Keep an eye on security alerts

Bigger companies have dedicated teams filtering the signal from the noise in all of the security data they collect from their systems.

You may not be ready to build a full-on Security Information and Event Management system (SIEM), but you don't need to fly blind. It’s very likely that the tools you’re already using have some security alerting features. They won’t always be the most sophisticated, but they can give you some visibility into malicious activity directed at your company.

Some good examples of these tools are AWS GuardDuty or Google’s Alert Center. Make it a point to regularly review new alerts coming from these services. Make use of the tools available to you, especially with critical systems like your identity provider and cloud platform. 

Alerts should be actionable. For example, a good alert might be “Jennifer, your coworker, just signed into Google from an unusual country.” It should be rare, and you can go ask Jennifer if she’s in that country. A less actionable alert would be “Jennifer, your coworker, just signed in.” Without any additional filtering you’re going to be staring at logs all day and bugging your coworkers all the time. The more likely scenario is that you’ll just end up ignoring them.

Warning: Watch out for alert fatigue. Find a way to silence alerts that provide no information or value. When you see an alert, you want to have the mental bandwidth to give it a good look before assuming it’s nothing.

Rob Picard, Internal Security Lead

About the author: Rob leads Vanta's internal security program. He has spent almost 8 years in the security industry, including time as a penetration tester, an early hire on Robinhood's security team, and a Y Combinator backed founder. Rob enjoys camping with his wife and two dogs, cooking, and drinking good bourbon.

Written by
No items found.
Access Review Stage Content / Functionality
Across all stages
  • Easily create and save a new access review at a point in time
  • View detailed audit evidence of historical access reviews
Setup access review procedures
  • Define a global access review procedure that stakeholders can follow, ensuring consistency and mitigation of human error in reviews
  • Set your access review frequency (monthly, quarterly, etc.) and working period/deadlines
Consolidate account access data from systems
  • Integrate systems using dozens of pre-built integrations, or “connectors”. System account and HRIS data is pulled into Vanta.
  • Upcoming integrations include Zoom and Intercom (account access), and Personio (HRIS)
  • Upload access files from non-integrated systems
  • View and select systems in-scope for the review
Review, approve, and deny user access
  • Select the appropriate systems reviewer and due date
  • Get automatic notifications and reminders to systems reviewer of deadlines
  • Automatic flagging of “risky” employee accounts that have been terminated or switched departments
  • Intuitive interface to see all accounts with access, account accept/deny buttons, and notes section
  • Track progress of individual systems access reviews and see accounts that need to be removed or have access modified
  • Bulk sort, filter, and alter accounts based on account roles and employee title
Assign remediation tasks to system owners
  • Built-in remediation workflow for reviewers to request access changes and for admin to view and manage requests
  • Optional task tracker integration to create tickets for any access changes and provide visibility to the status of tickets and remediation
Verify changes to access
  • Focused view of accounts flagged for access changes for easy tracking and management
  • Automated evidence of remediation completion displayed for integrated systems
  • Manual evidence of remediation can be uploaded for non-integrated systems
Report and re-evaluate results
  • Auditor can log into Vanta to see history of all completed access reviews
  • Internals can see status of reviews in progress and also historical review detail

The ultimate guide to scaling your compliance program

Learn how to scale, manage, and optimize alongside your business goals.

PCI Compliance Selection Guide

Determine Your PCI Compliance Level

If your organization processes, stores, or transmits cardholder data, you must comply with the Payment Card Industry Data Security Standard (PCI DSS), a global mandate created by major credit card companies. Compliance is mandatory for any business that accepts credit card payments.

When establishing strategies for implementing and maintaining PCI compliance, your organization needs to understand what constitutes a Merchant or Service Provider, and whether a Self Assessment Questionnaire (SAQ) or Report on Compliance (ROC) is most applicable to your business.

Answer a few short questions and we’ll help identify your compliance level.


Does your business offer services to customers who are interested in your level of PCI compliance?


Identify your PCI SAQ or ROC level

The PCI Security Standards Council has established the below criteria for Merchant and Service Provider validation. Use these descriptions to help determine the SAQ or ROC that best applies to your organization.

Good news! Vanta supports all of the following compliance levels:


A SAQ A is required for Merchants that do not require the physical presence of a credit card (like an eCommerce, mail, or telephone purchase). This means that the Merchant’s business has fully outsourced all cardholder data processing to PCI DSS compliant third party Service Providers, with no electronic storage, processing, or transmission of any cardholder data on the Merchant’s system or premises.

Get PCI DSS certified


A SAQ A-EP is similar to a SAQ A, but is a requirement for Merchants that don't receive cardholder data, but control how cardholder data is redirected to a PCI DSS validated third-party payment processor.

Learn more about eCommerce PCI

for service providers

A SAQ D includes over 200 requirements and covers the entirety of PCI DSS compliance. If you are a Service Provider, a SAQ D is the only SAQ you’re eligible to complete.

Use our PCI checklist

Level 1 for service providers

A Report on Compliance (ROC) is an annual assessment that determines your organization’s ability to protect cardholder data. If you’re a Merchant that processes over six million transactions annually or a Service Provider that processes more than 300,000 transactions annually, your organization is responsible for both a ROC and an Attestation of Compliance (AOC).

Automate your ROC and AOC

Download this checklist for easy reference


Learn more about how Vanta can help. You can also find information on PCI compliance levels at the PCI Security Standards Council website or by contacting your payment processing partner.

The compliance news you need. Delivered securely to your inbox.

Subject to Vanta's Privacy Policy, you agree to allow Vanta to contact you via the email provided for marketing and other purposes