Last updated: 15th March 2020
Focus on data insights and leave data security to us. Our products are developed with security at their core, guaranteeing compliance with all the latest standards and certifications.
Your data is encrypted with the latest security policies of AWS and Azure, encryption keys are also managed by AWS Key Management Service. In transit, all transport channels go through the HTTPS protocol. We use SSL encryption for all connections calling REST APIs.
Keboola runs in our cloud providers’ highly secure data centers, which utilize state-of-the-art electronic surveillance and multi-factor access control systems. Environmental systems in the datacenters are designed to remain resilient in the face of most failure modes, including natural disasters or system failures.
We use Snowflake’s time travel to maintain the ability of data rollback. In Amazon Redshift a snapshot is taken several times a day, which allows you to restore your data even if everything else fails.
Keboola's security and privacy is based on industry-standard frameworks, and we maintain a comprehensive suite of certifications to demonstrate our commitment to security and privacy.
For your data security, different users within your organization can have different access privileges. Additionally, with the full audit trail, it’s easy to monitor and trace all the data changes. Access to data is granted/restricted by the organization’s administrator to the level of a single bucket (set of data) allowing for the fine granularity of access control. The administrator can create short-lived tokens, which lower the possibility of oversight errors for historically granted and now outdated access credentials
We enforce a minimum of 8 characters long password rule, and it must be user-defined. Passwords are hashed with the CRYPT_BLOWDISH algorithm. And 10 wrong attempts within 5 minutes triggers CAPTCHA. Alternatively, you can use Google Authentication or SAML integration with other systems such as Active Directory.
Keboola supports MFA either via phone app or via hardware keys. Users can choose to use MFA, and organization admins can enforce MFA (so only users with MFA enabled are allowed to log in).