Sourcegraph’s workforce is distributed globally, with many employees working from home or other remote locations by default. This operating model allows flexibility and supports productivity, but it also introduces unique risks to the security of our information and systems.
The purpose of this procedure is to outline the controls necessary to protect Sourcegraph's assets and information, addressing the three core aspects of information security: Confidentiality (C), Integrity (I), and Availability (A). These controls are designed to safeguard both physical and logical access to sensitive data while recognizing the practical realities of mobile and remote working.
This procedure applies universally, including all employees and contractors who use Sourcegraph-issued assets or personal devices for company business. It is intended to be read in conjunction with Sourcegraph's Acceptable Use Policy.
By implementing these measures, we aim to mitigate security risks while enabling our remote-first teams to work efficiently and securely.
This procedure covers all laptops and mobile devices (phones, USB sticks, etc.) used for Sourcegraph business. The term "staff" includes contractors, temporary workers, and anyone using Sourcegraph assets or personal devices for company-related purposes.