ProsperOps places a primary focus on the security and protection of the data that you provide us. Our Engineering organization has designed and implemented the practices outlined below to provide you confidence and safeguard your information. If you have any questions regarding these practices, please do not hesitate to contact us.
Data we access and store
As a general practice we only access and store information required for us to deliver our discount optimization services, which includes metadata about the types of EC2 instances you are running and the RIs and Savings Plans present in your account.
The permissions you grant us to your AWS account(s) do not give us the ability to make changes to your applications or to view your customer data. We're granted the minimum permissions required to optimize your commitment portfolio and you have an opportunity to review the full IAM policy prior to implementing it. We follow AWS best practices for our IAM role configuration.
AWS service metadata (listings of EC2 instances, RIs, and Savings Plans) retrieved from your environment is stored inside our AWS environment and is encrypted using AWS KMS. Direct access to our production database is limited to a small number of ProsperOps employees on our engineering team that are responsible for supporting the production environment, and is accessed only on an as-needed basis. We do not proactively expire any of this information during the time in which you have an active subscription to ProsperOps.
Compliance and certifications
ProsperOps is built on the Amazon Web Services platform and benefits from the same infrastructure-level compliance and security practices as the applications and customers that we serve. The AWS infrastructure provides us with robust security at the software, hardware, network, and physical layers of the infrastructure stack. AWS implements a number of compliance programs including:
- ISO 27001
- SOC 1, SOC 2, and SOC 3
- PCI DSS Level 1
All payments are processed via our payment processing partner Stripe and we do not store any cardholder data in our systems. As described above, we do not have access to any of your customer or cardholder data as part of providing our service, so we are out of scope for customer PCI compliance efforts.
3rd Party Security Review / Penetration Testing
We have implemented automated 3rd party security testing of our platform which scans for thousands of vulnerabilities and threats on an ongoing basis. The scope of these tests include both cloud infrastructure (e.g. publicly accessible S3 buckets) as well as code and application level scanning (e.g. OWASP Top 10).
Reports are available upon request.
Application level security
Encryption in transit
All communication between our microservices is secured using SSL/TLS with 256-bit keys. We require the use of TLS 1.2 or above for all connections. All public-facing services are only accessible via HTTPS and we have enabled HSTS to ensure that any new services follow the same practices.
Encryption at rest
All datastores (databases, EBS volumes, S3 buckets, etc.) leverage the AWS Key Management Service (KMS) for data encryption at rest. Application-level secrets are encrypted using KMS and the AWS SDKs.
All user sessions expire one hour after login or after 30 minutes of inactivity, whichever comes first. Sessions are immediately updated or revoked upon changes to a user’s permissions by a customer administrator.
Code review and production deployments
All changes to ProsperOps applications are reviewed by a second engineer to ensure that they meet the standards outlined in this document. Code is verified in a staging environment and can only move to production after the formal engineering review process. Security of customer data is a top priority for our engineering organization, and we ensure that our team follows industry-established best practices throughout every feature of our applications.
Customers’ administrator users maintain full control over who has access to the ProsperOps Console and are responsible for creating, updating, and deleting user access as necessary.
Infrastructure level security
Instance and network security
ProsperOps runs each of its microservices inside of a Docker container and leverages the best-of-breed AWS network technologies (such as security groups and VPCs) to fully isolate and provide least-privilege access to each component of our infrastructure.
Backups and recovery
Our infrastructure leverages the built-in availability constructs provided by the AWS platform. We continually back up our production datastores and retain individual backups for at least 35 days in order to minimize the risk of any unintentional data loss. Historical log data for our administrative and infrastructure systems is stored for a minimum of 365 days.
ProsperOps leverages the Google account infrastructure for all access to our production applications. We benefit from the advanced security practices employed by Google and require all employees to use hardware security keys for their accounts. Third-party SaaS tools used by our team (such as Slack) leverage federation with Google whenever possible, and otherwise employ two-factor authentication provided directly by the tool itself.
Our administrative systems use role based access controls to ensure that each user’s access is least-privilege and aligned with their job responsibilities. Access to our production infrastructure is limited to members of the engineering team that require access to support our infrastructure and applications. We log all access to our administrative and infrastructure systems and periodically review access to ensure that it is still aligned with each user’s responsibilities. All privilege changes require management approval and are also logged for later review.