StreamSets Cloud Security Policy
Updated: November 26, 2019
- Overview. In connection with its provision of the StreamSets Cloud Service (the “Service”), StreamSets uses commercially reasonable organizational and technical measures designed to prevent unauthorized access, use, alteration, or disclosure of Customer Data processed on systems under StreamSets’ control.
- Cloud Providers. The Service is operated on Google Cloud (“Cloud Provider”) and protected by Cloud Provider’s security and environmental controls. Detailed information about Cloud Provider’s security is available at cloud.google.com/security.
- Customer Data. As defined in the Agreement, Customer Data consists of Pipeline Data and Configuration Data.
- Customer’s Pipeline Data is processed by the Service as follows:
- Data Persistence. Data Pipeline processing is performed in-memory and only persists to disk in rare cases where an operation requires storage for temporary data. Such data is always encrypted at rest. Pipeline Data does not persist beyond processing of the Data Pipeline.
- Troubleshooting. In order to support the troubleshooting of Data Pipelines, the Service allows a Customer with browser access to capture snapshots of Pipeline Data for analysis of a running Data Pipeline. Such data is stored temporarily in a private scratch space, then it is permanently deleted at completion time. This data is transmitted directly between the Data Pipeline execution environment and the Customer’s network browser and is encrypted both in transit via SSL/TLS v1.2+ and at rest via the encryption process provided by the Cloud Provider.
- Log files. Log Files generated by the execution of Data Pipelines are stored via a secure logging service provided by Cloud Provider and permanently deleted after thirty (30) days.
- Credentials. The Service provides a feature for managing access to Endpoint secrets and other credential data of Customer (the “Cloud Vault”). Credential data for Endpoint connectors is automatically stored in the Cloud Vault, which encrypts Customer credentials when at rest using Customer-specific keys.
- Connectors. Connectors are used by the Service to read and write Pipeline Data to Customer Endpoints. The Service provides configuration options, which defaults to an over-the-wire encrypted connection option when available. Customers are responsible for choosing appropriate secure connection option.
- Access by StreamSets Personnel. StreamSets Personnel have no direct access to Pipeline Data except in the event that Customer elects to purchase Support and specifically invites StreamSets Personnel to view a portion of Pipeline Data in the context of providing such Support as further described in the StreamSets Cloud Support Policy.
- Customer’s Configuration Data is processed by the Service as follows:
- Encryption. Customer manages Configuration Data within the Service. Configuration Data is encrypted both in transit via SSL/TLS v1.2+ and at rest via the encryption process provided by the Cloud Provider.
- Customer’s Pipeline Data is processed by the Service as follows:
- Technical Measures.
-
- Account Access and Permissions.
- Access to the Service is controlled by Customer via user IDs and passwords.
- Customers may designate an Organization Administrator to grant or revoke additional user access to its Service account or provide role-based permissions within Customer’s organizations.
- Only users registered by the Organizational Administrator may access Customer’s account.
- StreamSets limits access to Customer Data to those StreamSets employees and contractors needed to perform authorized tasks (“StreamSets Personnel“).
- StreamSets grants StreamSets Personnel access to Customer Data on an as-needed basis according to a role-based program. If such access is granted, StreamSets Personnel are prohibited from storing Customer Data on local desktops, laptops, mobile devices, shared drives, removable media such as USB drives, or on public facing systems that do not fall under the administrative control or compliance monitoring processes of StreamSets.
- StreamSets maintains and monitors access logs to the Service to review access by StreamSets Personnel.
- Upon termination of StreamSets Personnel, any access to Customer Data, the Service, and StreamSets’ facilities is terminated.
- Access to the Service is controlled by Customer via user IDs and passwords.
- Network Security / Intrusion Protection.
- Cloud Provider’s systems are ISO 27001 certified. For information about Cloud Provider’s SOC certification, please see cloud.google.com/security/compliance. Further, these systems deploy 24x7x365 monitoring, anomaly detection algorithms, and rule-based exception alert mechanisms.
- StreamSets’ own network (the “StreamSets Network“) is set behind a firewall and designed to detect and thwart inappropriate access.
- The StreamSets Network is tested with security groups defining access control lists on an as-needed basis.
- For enhanced security within the StreamSets Network, StreamSets imposes Network Address Translation to non-published addresses.
- On the StreamSets Network, StreamSets employs a centralized multi-factor authentication access management system to control StreamSets Personnel access to StreamSets’ servers.
- Asset Management.
- StreamSets’ assets, including StreamSets Personnel laptops, are tagged and tracked.
- StreamSets requires all StreamSets Personnel to report any lost assets immediately. Once a loss is reported, StreamSets will attempt to remotely wipe the asset.
- Managed antivirus is deployed on all StreamSets Personnel laptops and workstations to monitor for malware, viruses, and other malicious exploits. All local disk storages are encrypted by default.
- Audit Logs.
- All logs for the Service are reviewed on a regular basis.
- Any exception reporting, such as intrusion or breach detection, immediately triggers a review of all access logs.
- Account Access and Permissions.
</ol style=”list-style-type: lower-alpha;”>
-
- Physical and Environmental Controls.
- The Service is hosted with Cloud Provider and all physical security controls to Cloud Provider’s service are managed by Cloud Provider. StreamSets reviews Cloud Provider’s SOC 2 Type 2 report annually to ensure appropriate physical security controls.
- Physical access to StreamSets’ facilities is controlled via computer chip enabled key cards.
- 24x7x365 cameras are deployed at key StreamSets’ facilities to monitor entry points.
- Vulnerability Scans.
- Cloud Provider conducts regular vulnerability scans of its systems. Cloud Provider also enables Customer to conduct its own vulnerability testing of Cloud Provider’s systems.
- StreamSets conducts security vulnerability scans of the StreamSets Network on a regular basis. At least annually, StreamSets engages a third party to conduct similar scans. A copy of the results of such third-party scans will be provided to Customer upon reasonable request, no more than once annually, and such report will be deemed the Confidential Information of StreamSets without any further marking or designation.
- Security Incident Response.
- If StreamSets becomes aware of unauthorized access or disclosure of Customer Data under its control (a “Breach“), StreamSets will:
- Take reasonable measures to mitigate the harmful effects of the Breach and prevent further unauthorized access or disclosure.
- Upon confirmation of the Breach, notify Customer in writing of the Breach without undue delay. Notwithstanding the foregoing, StreamSets is not required to make such notice to the extent prohibited by Laws, and StreamSets may delay such notice as requested by law enforcement and/or in light of StreamSets’ legitimate needs to investigate or remediate the matter before providing notice.
- Each notice of a Breach will include:
- The extent to which Customer Data has been, or is reasonably believed to have been, used, accessed, acquired, or disclosed during the Breach;
- A description of what happened, including the date of the Breach and the date of discovery of the Breach, if known;
- The scope of the Breach, to the extent known; and
- A description of StreamSets’ response to the Breach, including steps StreamSets has taken to mitigate the harm caused by the Breach.
- If StreamSets becomes aware of unauthorized access or disclosure of Customer Data under its control (a “Breach“), StreamSets will:
- Organizational Measures.
- Background Checks. StreamSets performs background screening as part of the StreamSets hiring process, to the extent legally permissible. The scope of this screening includes:
- Criminal records.
- Verification reports including identity, previous employment, and social security number.
- Security Training.
- StreamSets conducts mandatory security awareness training for all StreamSets Personnel on an annual basis. The mandatory training includes the following topics, among others: Employee Access and Protection, Email, Passwords, Mobile Devices (BYOD), Clean Desk Policy, Protecting Your Computer, Social Engineering, Viruses/Malware, and Personally Identifiable Information (PII).
- StreamSets provides specialized training to StreamSets Personnel who are engaged in the development and operations of the Products.
- Additional security trainings are provided on an as-needed basis.
- StreamSets Personnel Management.
- StreamSets Personnel are required to conduct themselves in a manner consistent with the company’s guidelines regarding business ethics, appropriate usage, and professional standards.
- As a condition of employment, StreamSets Personnel are required to execute a confidentiality agreement.
- Background Checks. StreamSets performs background screening as part of the StreamSets hiring process, to the extent legally permissible. The scope of this screening includes: