Velociraptor Security

Velociraptor is a very powerful platform running with very high privilege and access on many endpoints. We take the security of Velociraptor very seriously.

This short page provides links to deeper topics of discussion before implementing Velociraptor in your environment.

Deployment security

Velociraptor is an enterprise grade tool and supports most of the security mechanisms expected from a trusted enterprise software, such as SSO, reverse proxies, mTLS, Role Based Access Control, Auditing and much more.

To become familiar with the different security mechanisms and considerations available for new deployments, please see our Deployment Security Guide

Artifact Security

Being able to collect sensitive forensic information from endpoints is a very powerful permissions. There are many escalation paths that can result in complete domain takeover by simply being able to collect forensic artifacts - for example, acquiring lsass.exe memory or downloading the SAM or NTDS.dit can lead to domain takeover.

Understanding how to manage this risk and leverage Velociraptor Role Based Access Control (RBAC) mechanisms is essential. You can read more about this in our Artifacts Security Guide .

Reporting Security Vulnerabilities

If you find a security issue in Velociraptor, please report it responsibly using this following;