Platform Security



SECURITY OVERVIEW

Nacelle takes trust very seriously and has systems and procedures in place which are designed to protect access to customer accounts and Customer Data (as defined below). This security measures outline provides an overview of Nacelle’s data security practices and procedures regarding Nacelle’s platform. The Nacelle Service does not include, and this outline does not apply to, pilot, beta, limited release, evaluation, non-production, trial or other similar services made available by Nacelle that are not generally available to Nacelle’s customers. Some of the security controls for the Nacelle platform that are described in this outline are implemented in connection with reputable security service providers and the security controls of other trusted service providers. Nacelle has built programs and mechanisms to align with industry standards on security and privacy. Please contact Nacelle’s sales or customer support teams to request a copy of Nacelle’s relevant security audit report(s).

Please note that Nacelle reserves the right to change this outline and the security controls contained herein from time to time, in its sole discretion, but will make the most recent version of this security outline available to its customers upon request.

ARCHITECTURE

Nacelle is built on Amazon Web Services (“AWS”).  Nacelle has implemented industry-standard security practices for AWS and continues to advance practices to help ensure the confidentiality, integrity and availability of data that flows through and is stored within the Nacelle platform. Information about security and privacy-related audits and certifications received by AWS, including information on its ISO 27001 certification and Service Organization Control (SOC) reports, is available on the AWS Compliance Programs Website. More information about AWS’ compliance program can be found on the AWS Compliance Website and in this section of the Amazon Web Services: Risk and Compliance Whitepaper.  Details on AWS’ security program can be found on the AWS Cloud Security Website and in this Introduction to AWS Security Whitepaper

‍WEB APPLICATION SECURITY 

Nacelle is hosted on AWS and delivered via a trusted Content Delivery Network (CDN). Nacelle leverages the security controls provided by these platforms, including Web Application Firewall, DDOS mitigation, and security assessments at the web and DNS (Domain Name Service) layer, to help protect against various kinds of application attacks. Services, protocols, and ports of Nacelle’s systems are restricted to only those required to run the Nacelle Service.

VULNERABILITY SCANS

Nacelle performs frequent vulnerability scans of its systems. The discovery of any security issue is logged in a vulnerability management process and remediated as deemed appropriate based on a risk assessment of the vulnerability.

SECURITY LOGS

Logs from all systems which provide services to the Nacelle platform are sent to a centralized logging service to enable security reviews and analysis for security events, such as intrusions and threats. Alerts are correlated and enhanced with threat intelligence.

INTRUSION DETECTION

Nacelle reviews logs for security and performance-related events. Nacelle continuously monitors the Nacelle platform for unauthorized intrusions and other malicious activities, leveraging industry-standard tools. All events and incidents are closed out upon completed review. 

INCIDENT MANAGEMENT

Procedures and processes are in place to respond to security incidents involving unauthorized access to or disclosure of Customer Data of which Nacelle becomes aware. 

ACCESS MANAGEMENT

Access management controls are enforced to prevent unauthorized access to Customer Data. Two-factor authentication (2FA) is enabled for all accounts with access to Nacelle's internal systems. Below are additional controls in place:

  • Each individual shall have a unique identifier (User ID) to log in to Nacelle Internal Systems.
  • Each individual shall be authenticated in order to access Nacelle Internal Systems.
  • Access rights for User IDs shall be restricted to least privilege necessary to perform job responsibilities.

Access to Nacelle Internal Systems is automatically revoked based on inactivity after a defined timeframe to reduce risk exposure and enforce the policy of least privilege access. In addition, frequent reviews are completed to help ensure that access is aligned with Nacelle’s least privilege access policy. 

PHYSICAL SECURITY

The Nacelle Service is hosted in production data centers that have physical, operational, and environmental security controls in place. These facilities are designed to withstand adverse weather and other reasonably predictable natural conditions, and are also supported by on-site back-up generators in the event of a power failure. Physical access to the production data centers is limited to authorized personnel subject to multi-factor authentication measures and to approved third parties escorted by authorized personnel. The facilities are also monitored by on-premises security guards and protected by additional physical security measures such as surveillance and intrusion detection systems.

RELIABILITY AND BACKUP

All Customer Data stored within the Nacelle platform, up to the last committed transaction, are automatically replicated on a near real-time basis at the database layer and are backed up regularly on secure, encrypted, and redundant storage.

BUSINESS CONTINUITY AND DISASTER RECOVERY

Nacelle maintains business continuity and disaster recovery plans for the Nacelle platform. Nacelle maintains reserved instances in different regions as a backup for the failure of the primary region.

In addition, Nacelle’s hosting provider (i) utilizes disaster recovery facilities that are geographically diverse from its primary data centers, along with required hardware, software, and Internet connectivity, in the event production facilities at the primary data centers were to be rendered unavailable, and (ii) has disaster recovery plans in place that are tested at least annually to validate the ability to failover a production instance from the primary data center to a secondary data center utilizing developed operational and disaster recovery procedures and documentation. Nacelle also performs regular tests of its own business continuity and disaster recovery plans. 

MALWARE PROTECTION

Nacelle uses software and other industry-standard measures to limit the risk of exposure to software viruses, malware and other known indicators of compromise.

DATA ENCRYPTION

Customer Data in transit is encrypted using TLS 1.2 or higher. Customer Data is encrypted at rest with AES-256, block-level storage encryption. Keys are managed by AWS Key Management Service, and individual volume keys are stable for the lifetime of the volume. All backup files are stored in an encrypted S3 bucket in the US region.

RETENTION AND DELETION OF CUSTOMER DATA

Customer Data is deleted in accordance with Nacelle’s agreements with customers.

SECURE DEVELOPMENT

Nacelle has policies and mechanisms to enable developers to identify security issues (security bugs, third-party vulnerabilities, misconfigurations, etc.) in the development process. The tools utilized complete automated scans on each change and provide Nacelle with information and guidance on how to remediate the issues before deployment. In addition, all changes are peer-reviewed for alignment with defined secure software development practices. 

INFRASTRUCTURE AS CODE

Nacelle infrastructure is built using infrastructure as code frameworks to automate the build and scale of the production workload. All code is scanned and reviewed for security and performance impacts before deployment. 

ENDPOINT SECURITY

Nacelle user endpoints are managed to follow industry standards on security. In addition, policies and technical mechanisms are in place to restrict access to the Nacelle platfrom from only Nacelle managed endpoints.

CONTINUOUS ASSESSMENT

Nacelle has enabled continuous monitoring tools to assess the security of its systems and services on a real-time basis and identify possible issues; reports of these assessments may be made available upon request. Any identified issue is reviewed and remediated as deemed appropriate based on the severity of the issue. 

OPERATIONAL AND SECURITY AUDITS

Nacelle completes annual audits against SOC2 security requirements. Please contact Nacelle’s sales or customer support teams to request a copy of such audit reports. The SOC2 Trust criteria covers the following areas:

  • Security – The system is protected against unauthorized access (both physical and logical).
  • Availability – The system is available for operation and use as committed or agreed.
  • Confidentiality – Information that is designated "confidential" is protected according to applicable agreements.

SECURITY ASSESSMENTS

Nacelle maintains a bug bounty program to allow for security reviews of its application and infrastructure by top security researchers, with the objective of identifying security bugs or misconfiguration leading to material impact on Nacelle's security controls.