Skip to content

Security

User Identity and Access

  • Table ACL: SQL based fine grained access
  • IAM Instance profiles: Allow AWS clusters to assume an IAM role, so users can access resources without needing access to physical storage
  • Securely stored access keys: Allow access to external storage
  • Secrets API: Separate code and credentials

Encryption

  • data-at-rest

    • Control plane is encrypted
    • Data plane supports local encryption
    • Customers can use encrypted storage buckets
    • Some tiers allow using CMK for managed services
  • data-in-motion

    • control-plane <-> data-plane is encrypted
    • optional intra-cluster encryption
    • customer code can avoid unencrypted services (e.g. FTP)

Isolation

  • Workspace level, each team/org uses different workspace
  • cluster level using ACL
  • single user cluster (private cluster)

Compliance

  • SOC2 Type II, ISO27001 etc
  • FedRAMP High, HITRUST, HiPPA, PCI
  • GDPR, CCPA