Security

Our managed services are SOC 2 certified providing confidence that your data is protected and that our security controls meet the highest possible industry standards.

Security at the Forefront

Security has been at the forefront of Instaclustr’s systems and operations since day one. We understand that you trust us with your valuable data and we take that responsibility very seriously. As part of our security focus, several of our offerings are PCI certified and we have been SOC 2 compliant for several years. Both of these certifications require individual, regular external compliance audits.

SOC2 Certification

The internationally recognized SOC 2 standard is a set of compliance requirements verifying the security practices of service providers and other companies storing sensitive customer data in the cloud. To achieve compliance, Instaclustr underwent an independent technical audit to assess its policies and procedures in accordance with three trust principles: Security, Availability, and Confidentiality.

While the Security trust principle is a mandatory component of the audit, Instaclustr chose to include the optional Availability and Confidentiality principles to further demonstrate to customers our strong data security capabilities.

With this designation, Instaclustr becomes the first – and currently the only – hosted Cassandra service provider to provide a security environment audited to meet the SOC 2 standards of the American Institute of Certified Public Accountants (AICPA).

Being SOC 2 compliance is now part of Instaclustr’s formal security program which includes regular independent penetration testing and participation in a bug-bounty program to encourage third-party reporting of potential security issues.

PCI Certification

We offer the ability to create cluster that are PCI certified in for Cassandra and Kafka on AWS. The PCI-DSS (Payment Card Industry Data Security Standard) is the payment card industry’s mandated information security standard and applies to all organizations that store, process, and/or transmit cardholder data. PCI-DSS certification requirements dictate that all system components either within the cardholder data environment or with access to it must feature specific and strict technical, physical, and operational security controls.

Our security program is designed around a methodology that includes security considerations in our design, continually reviewing and testing, monitoring the environment and having a suitable response capability.

 

With Instaclustr managed services our customers can achieve both SOC 2 certification and HIPAA (Health Insurance Portability and Accountability Act) compliance.

Security and Compliance - Cluster Security - Cassandra, Spark, Kafka

Cluster Security – Cassandra, Spark, Kafka

  • Each client cluster is created in a separate network environment (e.g. VPC in AWS) with no shared instances—(run in your own account customers may choose to create multiple clusters in a single VPC)
  • Encrypted EBS (using client controlled keys) supported for AWS, and disk encryption on by default for GCP and Azure
  • Option to provision Private Network cluster on AWS where nodes have no public IPs, and admin access is via a bastion box automatically provisioned within the VPC (required for PCI)
  • Internode encryption (with cluster-specific certs) enabled by default
  • Check box option when provisioning to enable client authentication and client to cluster encryption (client requirement for SOC 2 compliance)
  • Client controlled firewall whitelist
  • Use of private IPs to connect to your cluster (using VPC peering in AWS, and similar approaches for other providers)
  • Cluster hosted REST/HTTP interfaces all support HTTPS, and most services support automatic provisioning of externally signed certificates for cluster-specific DNS names
  • Out of the box default ‘Cassandra’ user is disabled on all Cassandra clusters, with non-default super user created on cluster provisioning
  • All communication from client nodes to our central infrastructure is initiated by the nodes (no inbound firewall rules other than SSH from operations environment)
  • Whitelist monitoring of open ports and running processes (basic intrusion detection)
  • Rapidly rotated and per-cluster password for Instaclustr admin access to Cassandra
  • Operating system hardened to CIS standards
  • Access logged and shipped to controlled central log management infrastructure
  • Restricted outbound firewall rules for PCI compliant clusters.
Security and Compliance - Security in our Management Console

Security in Our Management Console

  • Two factor authentication
  • Multiple users per account with different access levels
  • Two factor cluster deletion confirmation (requires separate confirmation via Instaclustr support before cluster is deleted)
  • Central management infrastructure has no access to data in customer clusters
  • Per-user access keys are separately available for our provisioning and monitoring APIs with the provisioning API disabled by default 
  • Sensitive data is encrypted before being stored in our management database
  • No credit card details are stored in our management infrastructure; they are passed directly to our credit card services provider
Security and Compliance - Security in our Operations Environment

Security in Our Operations Environment

  • Bastion servers, which provide access to our management servers and customer clusters, are accessed via VPN and VNC with copy out disabled to prevent egress of data from the management environment
  • All admin access to customer clusters is via two-stage bastion server using short-lived SSH certs for customer node access
  • All admin access to customer nodes logged, including any commands issued via CQLSH and are traceable to incident or request ticket
  • Admin access to our management environment is broadcast to an open internal Slack channel where it is monitored and linked to approved release or incident tickets
  • An Intrusion Detection System monitors all servers
  • A management tool, icadmin, is used as the preferred method of undertaking operations on customer cluster rather than manual configuration changes
  • Two factor authentication is required for access to all admin systems
  • Central management systems are hardened to applicable CIS standards
  • Outbound network access is restricted to defined, necessary services

FREE TRIAL

Spin up a cluster in less
than 5 minutes.
(No credit card required)

Sign Up Now
Close

Site by Swell Design Group