Skip to main content

Security Considerations for Cado Host

  • Cado Host releases are scanned with the same static analysis tools that we use for the primary Cado platform in our release pipeline.
  • Cado Host Windows binaries are signed with an EV (Extended Validation) code signing certificate.
  • An upcoming release will add support for customer hosted S3 buckets to deploy Cado Host from, enabling customers to scan any binaries deployed in their environments.
  • Cado Host uses limited time, write-only credentials generated by the Cado platform to access cloud storage.
  • Communication between Cado Host and the cloud storage is encrypted using TLS.

Cado Host requires running with elevated privileges to access the raw disk and memory. Whilst it can be run without elevated privileges, it will not be able to access the raw disk and memory and will not be able to perform a full forensic collection.