" fill="currentColor" / Compose g transform="matrix(1,0,0,1,-545.032,-326.868)" g transform="matrix(0.633757,0,0,0.633757,438.644,493.192)" path d="M325.442,75.285C315.946,75.285 309.313,68.018 309.313,57.614C309.313,47.045 315.795,39.944 325.442,39.944C334.938,39.944 341.571,47.21 341.571,57.614C341.571,68.018 334.938,75.285 325.442,75.285M325.442,28.643C308.788,28.643 296.7,40.827 296.7,57.614C296.7,74.401 308.788,86.586 325.442,86.586C342.096,86.586 354.183,74.401 354.183,57.614C354.183,40.827 342.096,28.643 325.442,28.643" g transform="matrix(0.633757,0,0,0.633757,438.644,493.192)" path d="M394.112,50.175L380.672,28.761L365,28.761L365,84.761L378,84.761L378,48.323L394.501,71.418L411,48.29L411,84.761L423,84.761L423,28.761L407.626,28.761L394.112,50.175Z" g transform="matrix(0.633757,0,0,0.633757,438.644,493.192)" path d="M460.059,55.761L448,55.761L448,40.761L460.059,40.761C464.596,40.761 467.644,44.119 467.644,48.261C467.644,52.404 464.596,55.761 460.059,55.761M461.336,28.761L436,28.761L436,84.761L448,84.761L448,66.761L461.336,66.761C472.477,66.761 480.257,58.445 480.257,47.761C480.257,37.077 472.477,28.761 461.336,28.761" g transform="matrix(0.633757,0,0,0.633757,438.644,493.192)" path d="M516.109,75.285C506.613,75.285 499.98,68.018 499.98,57.614C499.98,47.045 506.462,39.944 516.109,39.944C525.605,39.944 532.238,47.21 532.238,57.614C532.238,68.018 525.605,75.285 516.109,75.285M516.109,28.643C499.455,28.643 487.368,40.827 487.368,57.614C487.368,74.401 499.455,86.586 516.109,86.586C532.763,86.586 544.851,74.401 544.851,57.614C544.851,40.827 532.763,28.643 516.109,28.643" g transform="matrix(0.633757,0,0,0.633757,438.644,493.192)" path d="M576.87,50.658C570.413,49.021 566.493,47.831 566.493,45.118C566.493,41.975 569.369,40.023 573.998,40.023C579.617,40.023 584.709,42.014 588.335,45.629L589.555,46.846L596.784,37.489L595.811,36.55C590.427,31.356 583.356,28.722 574.796,28.722C562.677,28.722 553.88,35.886 553.88,45.755C553.88,58.092 564.92,60.88 573.792,63.122C580.726,64.873 584.937,66.181 584.937,69.553C584.937,72.197 582.532,75.285 575.755,75.285C567.667,75.285 562.421,70.996 560.014,68.439L558.755,67.103L551.759,76.761L552.612,77.67C558.091,83.503 565.956,86.586 575.355,86.586C591.66,86.586 597.47,77.334 597.47,68.677C597.47,55.883 585.564,52.863 576.87,50.658" g transform="matrix(0.633757,0,0,0.633757,438.644,493.192)" path d="M650,40.761L650,28.761L608,28.761L608,84.761L650,84.761L650,73.761L620,73.761L620,61.761L646,61.761L646,50.761L620,50.761L620,40.761L650,40.761Z" g transform="matrix(0.633757,0,0,0.633757,438.644,493.192)" path d="M238,57.939C238,74.727 249.949,86.941 267.019,86.941C275.946,86.941 283.408,83.379 288.677,76.244L280.717,68.288C278.294,72.318 272.444,75.701 267.518,75.701C257.756,75.701 250.707,68.148 250.707,57.909C250.707,47.67 257.81,40.116 267.571,40.116C272.497,40.116 278.428,43.499 280.851,47.53L288.958,39.574C283.688,32.438 275.944,28.876 267.017,28.876C249.947,28.876 238,41.091 238,57.878L238,57.939Z" / An IBM Company g transform="matrix(0.656956,0,0,0.656956,-327.788,-160.624)" g transform="matrix(1,0,0,1,263.379,493.817)" path d="M385.889,121.454L377.72,100.658L373.168,100.658L365,121.454L369.146,121.454L370.674,117.463L380.215,117.463L381.742,121.454L385.889,121.454ZM379.186,114.252L371.703,114.252L375.444,104.337L379.186,114.252Z" g transform="matrix(1,0,0,1,263.379,493.817)" path d="M407.745,121.454L407.745,100.658L404.097,100.658L404.097,115.094L393.465,100.658L389.724,100.658L389.724,121.454L393.372,121.454L393.372,106.613L404.222,121.454L407.745,121.454Z" g transform="matrix(1,0,0,1,263.379,493.817)" rect x="423.303" y="100.658" width="3.648" height="20.796" g transform="matrix(1,0,0,1,263.379,493.817)" path d="M443.444,121.454C447.341,121.454 449.493,119.053 449.493,115.842C449.493,113.285 447.684,111.072 445.471,110.729C447.404,110.323 449.087,108.577 449.087,105.958C449.087,103.028 446.967,100.658 443.163,100.658L432.937,100.658L432.937,121.454L443.444,121.454ZM442.415,109.263L436.585,109.263L436.585,103.869L442.415,103.869C444.286,103.869 445.346,105.023 445.346,106.582C445.346,108.141 444.286,109.263 442.415,109.263M442.571,118.243L436.585,118.243L436.585,112.475L442.571,112.475C444.66,112.475 445.751,113.784 445.751,115.343C445.751,117.151 444.566,118.243 442.571,118.243" g transform="matrix(1,0,0,1,263.379,493.817)" path d="M476.306,121.454L476.306,100.658L471.162,100.658L465.487,114.345L459.844,100.658L454.699,100.658L454.699,121.454L458.347,121.454L458.347,106.021L464.708,121.454L466.267,121.454L472.658,106.021L472.658,121.454L476.306,121.454Z" g transform="matrix(1,0,0,1,263.379,493.817)" path d="M501.841,121.828C506.05,121.828 508.607,119.646 510.197,117.151L507.079,115.561C506.081,117.307 504.086,118.585 501.841,118.585C497.725,118.585 494.67,115.436 494.67,111.072C494.67,106.707 497.725,103.558 501.841,103.558C504.086,103.558 506.081,104.867 507.079,106.582L510.197,104.992C508.638,102.497 506.05,100.315 501.841,100.315C495.699,100.315 490.929,104.68 490.929,111.072C490.929,117.463 495.699,121.828 501.841,121.828" g transform="matrix(1,0,0,1,263.379,493.817)" path d="M524.383,121.828C530.619,121.828 535.015,117.276 535.015,111.072C535.015,104.867 530.619,100.315 524.383,100.315C518.147,100.315 513.751,104.867 513.751,111.072C513.751,117.276 518.147,121.828 524.383,121.828M524.383,118.585C520.174,118.585 517.493,115.343 517.493,111.072C517.493,106.769 520.174,103.558 524.383,103.558C528.561,103.558 531.273,106.769 531.273,111.072C531.273,115.343 528.561,118.585 524.383,118.585" g transform="matrix(1,0,0,1,263.379,493.817)" path d="M561.703,121.454L561.703,100.658L556.559,100.658L550.884,114.345L545.241,100.658L540.096,100.658L540.096,121.454L543.744,121.454L543.744,106.021L550.105,121.454L551.664,121.454L558.055,106.021L558.055,121.454L561.703,121.454Z" g transform="matrix(1,0,0,1,263.379,493.817)" path d="M571.337,121.454L571.337,113.691L576.824,113.691C581.158,113.691 583.621,110.698 583.621,107.174C583.621,103.651 581.189,100.658 576.824,100.658L567.689,100.658L567.689,121.454L571.337,121.454ZM576.325,110.479L571.337,110.479L571.337,103.869L576.325,103.869C578.383,103.869 579.88,105.179 579.88,107.174C579.88,109.17 578.383,110.479 576.325,110.479" g transform="matrix(1,0,0,1,263.379,493.817)" path d="M604.573,121.454L596.405,100.658L591.852,100.658L583.683,121.454L587.831,121.454L589.358,117.463L598.899,117.463L600.426,121.454L604.573,121.454ZM597.87,114.252L590.387,114.252L594.128,104.337L597.87,114.252Z" g transform="matrix(1,0,0,1,263.379,493.817)" path d="M626.429,121.454L626.429,100.658L622.781,100.658L622.781,115.094L612.149,100.658L608.408,100.658L608.408,121.454L612.056,121.454L612.056,106.613L622.906,121.454L626.429,121.454Z" g transform="matrix(1,0,0,1,263.379,493.817)" path d="M641.956,121.454L641.956,112.818L650,100.658L645.822,100.658L640.147,109.575L634.411,100.658L630.233,100.658L638.308,112.818L638.308,121.454L641.956,121.454Z" g transform="matrix(1,0,0,1,74.4342,36.1729)" path d="M158.1 23.1h-.1l-38.8-22.6-38.3 22.3-39.3-22.8-41.6 24.2v44l80.3 46.8 38.4-22.2 39.4 22.8 41.9-24.2v-44l-41.9-24.3zm-.2 45.1l-32.9-19.1 33.2-19.4 32.9 19.3-33.2 19.2zm-77.9-38.8l33.2 19.2-32.8 19.1-33.1-19.3 32.7-19zm72.2-3l-32.5 18.9-33.1-19.2 32.6-19 33 19.3zm-77.5-.6l-6.7 3.9-27.1 15.3-32.3-19.2 33.1-19.2 33 19.2zm-68.9 4.8l32.5 19.6v34.6l-32.5-19.8v-34.4zm39 23l32.5 19.3v34.5l-32.5-19.3v-34.5zm77.3.4l33.1 19.5v34.2l-33.1-19.7v-34z" g opacity=".5" polygon points="44.8,88.2 77.3,107.3 77.3,72.9 44.8,53.6" polygon points="5.8,64.9 38.3,84.7 38.3,50.2 5.8,30.6" polygon points="122.1,88.1 155.2,107.8 155.2,73.5 122.1,54"
ComposeCompose an IBM company
Why ComposeDatabasesEnterprisePricingArticlesStatus
Sign InSign Up

Security

Important security information regarding Compose, Inc., an IBM Company.
Last Revised: July 23, 2014

Need more help?Contact Support

Compose's Security Policy

How to Report a Security Problem

If you feel the issue is urgent or has some sensitive element involved, please send your report directly to security@compose.com. To ensure confidentiality in the reporting process, please use our public key. Doing this will also give us a secure way to respond to your concerns, usually within 24 hours.

If your issue isn't urgent or sensitive, you should submit a support request where it will be handled through our normal support processes.

How We Manage Security Issues

To keep up with the latest in web security and to ensure our defences are effective, we work with security researchers. If you are a security researcher who is aware of a web security flaw that may affect our platforms and products, please let us know. Submitted reports will be…

1. Acknowledged

We will inform you of the best way to keep track of the issue.

2. Investigated

We will look into the issue and work out how it affects our systems. Although we won't disclose the issues until the investigation is completed, we will work with you so that all involved fully understand the issue.

3. Credited

We will publicly thank the reporter for discovering and helping us correct a security issue on this page.

Our products are built on a wide range of technologies and issues reported may be an issue with one of those technologies. Where that is the case, we will work with the communities and companies behind those technologies to ensure that they are protected from the same issue and avoid a situation where early public disclosure leaves others at risk. With that in mind, we ask for your understanding and patience in advance and assure you that is such a step is necessary that we will keep you informed.

4. Excluded Reports

Only noteworthy reporting is eligible for acknowledgement on the site. The following classes of report are ineligible:

  • Reports from automated tools, scripts and tools - Many tools are noisy and generate false positives. If you believe that you have found an issue, to be noteworthy the problem must be accompanied by details of a practical exploit to eliminate those false positives.
  • SSL cipher issues - We only accept cipher issues as noteworthy if they are accompanied with details of a practical exploit leveraging that cipher issue.

Big Thanks

We'd like to thank the following security researchers and companies whom have worked with us to keep Compose as secure as possible by finding, fixing, and responsibly disclosing security flaws:

  • Matasano
  • iSEC Partners
  • Buffer
  • Nishant Raj
  • Kamil Sevi
  • Swapnil A. Thaware
  • Jitendra Jaiswal
  • Ahmed Jerbi (Web Plus)
  • Milan A Solanki
  • Satheesh Raj (@rsatheesh523)
  • Joel Melegrito (@Superngorks)
  • Madhu Akula
  • DJ (WritingOddity)
  • C Vishnu Vardhan Reddy (Vishnu_dfx).
  • Jan Kulinski, MetricWire
  • Dan Gilkerson
  • Shawar Khan
  • Ahsan Khan
  • Raja Uzair Abdullah
  • Yeasir Arafat
  • Abin Joseph
  • Shaifullah Shaon (Black_EyE)
  • Jens Müller (@jensvoid)
  • Pal Patel
  • Pradipta Das
  • Pritesh Mistry
  • Sundar Lal Baror
  • Deepanshu Tyagi (dtyagi53)
  • Himanshu Rahi (himanshu.rahi.31)
  • Pethuraj M
  • Vyshnav Nk
  • Kaushik Sardar

Still need some help?

If this page doesn't answer your questions, summon a human and ask away!

Join 50,000 devs on our weekly newsletter.

Products
DatabasesPricingAdd-onsData CentersEnterprise
Learn
Why ComposeArticlesWrite StuffCustomer StoriesWebinars
Company
AboutPrivacy PolicyTerms of Service
Support
SupportContact UsDocumentationSystem StatusSecurity
© 2019 Compose, an IBM Company

Our site uses cookies to identify users & remember preferences - continued use of our site means you do not object to this. Dismiss