The entire dbt Cloud team is focused on keeping you and your data safe. We adhere to industry-leading standards to manage our network, secure our application, and set policies across our organization.
Communication & Encryption #
All connections to dbt Cloud are encrypted by default, in both directions using modern ciphers and cryptographic systems. We maintain an A+ rating from Qualys/SSL Labs. We encrypt in transit utilizing TLS 1.2.
Any attempt to connect over HTTP is redirected to HTTPS.
We use HSTS to ensure browsers interact with dbt Cloud only over HTTPS
We utilize AES-256 for all data encrypted at rest.
Penetration Testing #
- dbt Cloud undergoes an annual penetration testing from an outside provider, and regularly installs the latest, secure versions of all underlying software.
PCI: Before granting dbt Cloud access to data subject to PCI requirements, please contact support at firstname.lastname@example.org.
HIPAA: Before granting dbt Cloud access to data subject to HIPAA requirements, please contact support at email@example.com.
GDPR: dbt Cloud is fully GDPR compliant. dbt Cloud’s Terms of Service includes a Data Processing Addendum that enacts standard contractual clauses set forth by the European Commission to establish a legal basis for cross-border data transfers from the EU.
SOC2 Type II: A SOC 2 examination, performed by an independent, certified public accounting (CPA) firm, is an assessment of a service provider’s security control environment against the trust services principles and criteria set forth by the American Institute of Certified Public Accountants (AICPA). The result of the examination is a report which contains the service auditor’s opinion, a description of the system that was examined, management’s assertion regarding the description, and the testing procedures performed by the auditor. dbt Cloud completed a SOC 2 Type II examination, which means its controls were assessed based on their operating effectiveness over the reporting period of July 1, 2020 to December 31, 2020. Our SOC2 Type II is available for review under MNDA upon request.
Data Processing #
When writing interactive queries from the IDE, for example: “select * from customers limit 100,” the data from your customers table will pass through the dbt Cloud infrastructure on the way to your browser. However, this data is not persisted in any way (caching or otherwise). It does not live on our servers outside of your browser sessions.
Data Storage #
dbt Cloud stores the following data persistently:
- dbt Cloud account information including job definitions, database connection information, users, etc. Cloud account information does not include any raw data from your warehouse.
- Logs associated with jobs and interactive queries you’ve run.
- Your dbt “assets” which include things like run_results.json and manifest.json.
Logs and assets do not include raw data from the warehouse unless the code you write commands it. For example, it’s possible to write dbt code that fetches all customer data from your customer table and writes it to the logs. While that’s usually not a good idea, it is possible, and would mean that information is stored in dbt Cloud.
Asset Management #
- Laptops are protected by full disk encryption using FileVault2, and managed by Jamf Pro MDM.
Availability, Business Continuity, & Disaster Recovery #
dbt Cloud is hosted in AWS, with availability in multiple AZ’s (availability zones) in a region.
Our retention of backups are a minimum of seven (7) days.
Our staff is remotely distributed across the US providing support to customers globally. Our distributed workforce allows us to provide support virtually from anywhere and reduce the impact of support interruption in a geographic location.
Security Protocols #
dbt Cloud’s data centers are hosted using Amazon Web Services, where they are protected by electronic security, intrusion detection systems, and 24/7/365 human staff.
dbt Cloud uses actively maintained, long-term-supported operating systems that are kept up to date with the latest security patches.
dbt Cloud uses a dedicated firewall and private network to prevent unauthorized network access.
We limit access to sensitive data to a few senior employees.
We review new features for security impact before release.
Security Recommendations #
Limit dbt Cloud’s access to your warehouse to strictly the datasets processed by dbt.
Use SSL or SSH encryption to protect your data and credentials while in transit. Choose strong passwords for your database users.
Research and Disclosure #
dbt Labs is committed to working with security experts across the world to stay up to date with the latest security techniques. If you believe you have found a security vulnerability in dbt Core or dbt Cloud, we encourage you to let us know right away. We will investigate all legitimate reports and do our best to quickly fix the problem.
If you believe you have discovered a problem or have any questions, please contact us at firstname.lastname@example.org.