Logz.io See the logz that matter

Similar documents
Building Energy Security Framework

GoodData Corporation Security White Paper

Anypoint Platform Cloud Security and Compliance. Whitepaper

A Sumo Logic White Paper. Sumo Logic Security Model. Secure by Design

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

BMC s Security Strategy for ITSM in the SaaS Environment

THE BLUENOSE SECURITY FRAMEWORK

Secure and control how your business shares files using Hightail

Famly ApS: Overview of Security Processes

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

White Paper How Noah Mobile uses Microsoft Azure Core Services

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

The Essential Security Checklist. for Enterprise Endpoint Backup

Simple Storage Service (S3)

WALKME WHITEPAPER. WalkMe Architecture

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

White Paper The simpro Cloud

HIPAA Privacy & Security White Paper

Security Overview Enterprise-Class Secure Mobile File Sharing

OrgChart Now Information Security Overview. OfficeWork Software LLC

RMS. Privacy Policy for RMS Hosting Plus and RMS(one) Guiding Principles

White Paper: Librestream Security Overview

Why should you look at your logs? Why ELK (Elasticsearch, Logstash, and Kibana)?

5 Questions to ask a 3 rd Party Cloud Provider

Cloud Security Trust Cisco to Protect Your Data

The Education Fellowship Finance Centralisation IT Security Strategy

Addressing Cloud Computing Security Considerations

CONTENT OUTLINE. Background... 3 Cloud Security Instance Isolation: SecureGRC Application Security... 5

Study concluded that success rate for penetration from outside threats higher in corporate data centers

Amazon Cloud Storage Options

Expand Your Infrastructure with the Elastic Cloud. Mark Ryland Chief Solutions Architect Jenn Steele Product Marketing Manager

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk

Managing digital audio video court record in the age of HD video and YouTube. technology and privacy. Tony Douglass President, For The Record

Security Whitepaper. NetTec NSI Philosophy. Best Practices

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Analyzing HTTP/HTTPS Traffic Logs

twilio cloud communications SECURITY ARCHITECTURE

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Helping people make better decisions DATA SECURITY POLICY. Kiilakiventie 1, Oulu, Finland tel:

Security in the Sauce Labs Cloud. Practices and protocols used in Sauce s infrastructure and Sauce Connect

DiamondStream Data Security Policy Summary

Cloud S ecurity Security Processes & Practices Jinesh Varia

IT SERVICE MANAGEMENT FAQ

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Clever Security Overview

OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

Agio Remote Monitoring and Management

Security Practices, Architecture and Technologies

itanalyzer Data Protection Module

VMware vcloud Air Security TECHNICAL WHITE PAPER

We employ third party monitoring services to continually audit our systems to measure performance and identify potential bottlenecks.

Running Oracle Applications on AWS

Secure, Scalable and Reliable Cloud Analytics from FusionOps

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Securing SaaS Applications: A Cloud Security Perspective for Application Providers

319 MANAGED HOSTING TECHNICAL DETAILS

The Netskope Active Platform

White Paper. BD Assurity Linc Software Security. Overview

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Managed Security Services for Data

Information Technology Policy

Securing Enterprise Mobility for Greater Competitive Advantage

Evaluation criteria for Google Apps backup

Overview Servers and Infrastructure Communication channels Peer-to-Peer connections Data Compression and Encryption...

Security in the Sauce Labs Cloud

Managing Public Cloud Workloads

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Information Blue Valley Schools FEBRUARY 2015

Migration Scenario: Migrating Batch Processes to the AWS Cloud

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Credit Unions and The Cloud. By: Chris Sachse

GoodData Security Overview

A Brave. Who Owns Security in the Cloud? A Trend Micro Opinion Piece. February Written by Dave Asprey VP Cloud Security

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Blue Jeans Network Security Features

Cloud Vendor Evaluation

EXECUTIVE STRATEGY BRIEF. Securing the Cloud Infrastructure. Cloud. Resources

Security Document. Issued April 2014 Updated October 2014 Updated May 2015

An Evaluation Framework for Selecting an Enterprise Cloud Provider

Logically Securing a Public Cloud Service

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Overview. Edvantage Security

HEC Security & Compliance

Paxata Security Overview

PCI Requirements Coverage Summary Table


CLOUD FRAMEWORK & SECURITY OVERVIEW

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Cloud Contact Center. Security White Paper

Cloud Portal Office Security Whitepaper. October 2013

PCI Compliance for Cloud Applications

Information Protection

Transcription:

See the logz that matter How Logz.io Secures Customer Log Data White Paper A certain amount of confidence is needed when relying on third party vendors to manage and handle your online data and log files securely. Therefore the need exists for a solution that protects the integrity of your data, in its entirety, around the clock. Built by enterprise security veterans hailing from firewall innovator Check Point Software, Logz.io goes above and beyond to support and protect our customers' secure environments with log management and analysis. This white paper delves into how we developed our innovative microservices architecture to integrate best-of-breed technology with meticulous organizational processeses and a human touch for online service security. First, our culture and internal development, operations, and DevOps processes themselves have been constructed to provide maximum data security. Second, from network and cloud instance logical security to physical data center security, we are able to secure services, data, and access. Finally, we instilled five key underlying features in our architecture at the beginning.

Logz.io Security Measures Internal R&D Processes Security-oriented environments start with high coding standards that guard against attempted security breaches and are accompanied by rigorous code reviews and tests (such as code coverage testing). We employ the strictest development processes and coding standards to ensure that both adhere to the best security practices. In addition, our testing platform performs a set of various black box and white box tests for quality assurance (including ongoing penetration tests). R&D processes are implemented and supported with security as a first priority across all system layers, from the physical layers up to the application layer. Architecture Diagram ANALYTICS Insights DATA COLLECTION Fast Search Private Cloud Mobile Server <APP> Docker Public Cloud Network Security devices LOGZ.IO Machine learning Real Time Aggregations USER INTERFACE LOG DATA INDEXING Alerts Search and troubleshooting User roles Reports Dashboards Library Scalability Processing and indexing History view High availability Extended

Physical Data Center Security We rely on the Amazon cloud's exceptionally flexible and secure cloud infrastructure to store data logically across multiple AWS cloud regions and availability zones. AWS makes abiding by industry and government requirements simple and ensures the utmost in data security and protection. For example, AWS infrastructure aligns with IT security best practices and follows a number of compliance standards such as: SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70 Type II) HIPPA SOC 2 SOC 3 FISMA DIACAP FedRAMP All data centers that run our solution are secured and monitored 24/7, and physical access to AWS facilities is strictly limited to select AWS cloud staff. (For more information about AWS' secure architecture and compliance certifications, visit: http://aws.amazon.com/security.) Instance and Network Security Every microservice runs inside a well-defined Docker container that allows specific levels of access to select controllers. We use Docker to avoid erroneous instance-configuration changes, upgrades, and corruption that are common sources of security breaches. Additionally, we harden operating systems within containers to enable various network access controls (such as iptables). We take the necessary precautions to ensure that every layer involved in data transfer is secured by best-of-breed technologies. Our network is segmented using AWS security groups, VPCs, ACLs, and additional custom measures. In addition, our threat control center is kept up to date with security alerts that are analyzed and addressed in real-time. Through in-depth network monitoring, we are able to detect anomalies and take a proactive approach to eliminating potential breaches.

Customer Data Security We secure each and every step of data funnel by provisioning dedicated data stores for each individual customer, ensuring full data-segregation. Data is tagged, segregated, and tunneled through our data-ingestion system. We mark each specific piece of given customer data according to its associated organization, which is associated with that data throughout its life cycle. When data is in transit in our ingestion pipeline, it is marked with specific information, including its associated customer, so that it can only be accessed by that customer. We support SSL encryption for data in transit, so customers can securely upload their data to the Logz.io cloud and securely browse through their own Logz.io console. Cold data is encrypted and hosted in separate Simple Storage Service (S3) buckets, which are secured via durable AES 256-bit encryption. In addition, we continuously track and maintain the location and state of our customers' data. That way, when we retire an operating system, for example, and decommission the related machine, we can be sure to wipe clean any informational residue that may have been left behind before returning the machine to AWS. Disks are specially formatted to ensure that data recovery is not possible at a later point in time. Access Management We support role-based access through the Logz.io interface, allowing users to be defined as admins or users as well as suspended or deleted. Our customers account administrators manage and control user access, including provisioning new users with a defined access level.

Summary To further emphasize the points mentioned above, data security is more important now than ever before. We re able to achieve higher privacy and security levels than most organizations. As a result of understanding the sensitivity of our customers log data, we have built and continue to maintain our system with enterprise-grade security in mind. Leveraging a multi-layered approach, Logz.io has a SOC team that handles security matters as well as security architects who define and implement security protocols, procedures, team education and enforcement. We put application and data security first. Please feel free to contact us with any questions, suggestions or concerns about any of the points outlined above at: security@logz.io