How We Manage Security
The internationally recognized SOC 2 standard is a set of compliance requirements verifying the security practices of service providers and other companies storing sensitive customer data in the cloud. To achieve compliance, Instaclustr underwent an independent technical audit to assess its policies and procedures in accordance with three trust principles: Security, Availability, and Confidentiality.
While the Security trust principle is a mandatory component of the audit, Instaclustr chose to include the optional Availability and Confidentiality principles to further demonstrate to customers our strong data security capabilities.
With this designation, Instaclustr becomes the first – and currently the only – hosted Cassandra service provider to provide a security environment audited to meet the SOC 2 standards of the American Institute of Certified Public Accountants (AICPA).
Being SOC 2 compliance is now part of Instaclustr’s formal security program which includes regular independent penetration testing and participation in a bug-bounty program to encourage third-party reporting of potential security issues.
Our security program is designed around a methodology that includes security considerations in our design, continually reviewing and testing, monitoring the environment and having a suitable response capability.
With Instaclustr managed services our customers can achieve both SOC 2 certification and HIPAA (Health Insurance Portability and Accountability Act) compliance.
Cluster Security – Cassandra, Spark, Kafka
- Each cluster is created in a separate network environment with no shared instances
- Encrypted EBS (using client controlled keys) supported for AWS & disk encryption on by default for GCP and Azure.
- Internode encryption (with cluster-specific certs) enabled by default.
- Client controlled firewall whitelist.
- Cassandra Security – use private IPs to connect to Cassandra and Spark in your cluster (using VPC peering in AWS and similar approaches in other providers).
- Kafka security – when creating an Instaclustr Kafka cluster, regardless of which client ⇆ broker encryption settings you choose, we enforce broker ⇆ broker encryption and client authentication using SCRAM on all clusters.
Security in Our Management Console
- Two-factor authentication.
- Per-user access keys are separately available for our provisioning and monitoring APIs with the provisioning API disabled by default.
- Sensitive data is encrypted before being stored in our management database.
Security in Our Operations Environment
- All Instaclustr access to customer clusters is via two-stage bastion server using short-lived SSH certs for customer node access.
- All Instaclusr access to customer nodes logged including any commands issued via CQLSH and traceable to incident or request ticket.
- A bespoke Intrusion Detection System monitors all servers.
- A management tool, icadmin, is used as the preferred method of undertaking operations on customer cluster rather than manual configuration changes.