Overview
Stacksync is committed to security and focused on keeping you and your data safe. Stacksync adheres to industry-leading standards while connecting your apps together.
Updated July 10, 2024
Stacksync is committed to security and focused on keeping you and your data safe. Stacksync adheres to industry-leading standards while connecting, replicating, and loading data from all of your data sources.
Contact security@stacksync.cloud if you have any questions or comments.
TL;DR
Stacksync does not store any customer data, data is only processed at Stacksync but never persisted. Even during transit, all data is encrypted with AES encryption (military-grade protocol). Only the credentials to access the client's external platform instance or database, and some minimum metadata about the tables and columns synced are stored (not all columns, only the ones that are selected to be synced). The metadata is stored in a custom Stacksync format, which removes most of the tables and columns attributes, keeping only the name of the column (or identifier) and datatype.
All data and credentials are AES encrypted with regularly rotating keys in a fully autonomous way, such that no one can access it in production. Stacksync stands at the top standard in terms of security and privacy.
Stacksync lets you choose the region where your data is processed. This enables for maximum compliance and system performance (due to proximity with client’s data sources).
Detailed security policies
Web portal connectivity
All connections to Stacksync's web portal are encrypted by default using industry-standard cryptographic protocols (TLS 1.2+).
Any attempt to connect over an unencrypted channel (HTTP) is redirected to an encrypted channel (HTTPS).
To take advantage of HTTPS, your browser must support encryption protection (all versions of Google Chrome, Firefox, and Safari).
Role Based Access Control (RBAC)
Users accessing the Stacksync User Interface (UI) for a given workspace are subject to Role Based Access Control (RBAC). These are the different roles. Below is a top level description for every role:
Owner (there is exactly one Owner per workspace). The Owner has all the permission that the Editors have, but they are also able and responsible to manage the billing settings for the workspace.
Editor (there can be zero or many Editors per workspace). Editors can view and edit most resources in the workspace.
Viewer (there can be zero or many Viewers per workspace). Viewers can view most workspace resources but cannot edit anything in the workspace.
Some resources such as, for example, Connections, API proxy services or Schedules jobs have the option to be shared with other members of the workspace. Depending on the resource type and if the collaboration with other members of the workspace is deactivated, the resource will be non-editable for all users other than its resource creator and in certain cases even non-visible. This offers higher security levels for some workspace resources.
RBAC is workspace-specific. Users can have different roles in different workspaces. A User can have only one role per workspace.
Connectors
Connections to customers' database sources and destinations are SSL encrypted by default.
Stacksync can support multiple connectivity channels
Connections to customers' software-as-a-service (SaaS) tool sources and destinations are encrypted through HTTPS.
Permissions
Databases and API cloud applications - Stacksync requires READ and WRITE permissions.
Connected Applications - Stacksync requires the READ and WRITE permission. This permission allows Stacksync to CREATE a schema within your destination, CREATE tables within that schema, and WRITE to those tables.
Retention of customer data
How long we retain customer data depends on the data type:
In the following two cases, customer data is purged as soon as it is successfully written to the destination. If the data writing process takes longer than usual, the data is however kept for object lifecycle management:
Destination outage: If your destination is down, we maintain the data that we've read from your source so we can resume the sync without losing progress once the issue is resolved.
Schema information for column blocking or hashing purposes: If you choose not to sync a column before syncing your new connector, we queue your data while we read the full schema. We only write the data to the destination that you approve.
Encryption and Hashing
Stacksync uses best-in-clash algorithm to encrypt and hash your data.
Encryption: AES encryption with autonomous rotating keys. Encryption keys are frequently updated ensuring effective partitioning of data on several keys as well as perfect forward secrecy. AES is a military-grade standard.
Hashing: various algorithm, often coupled with byte compression.
Solution infrastructure
Access to Stacksync production infrastructure is only allowed via hardened IAM (identity and access management) policies. Further access to the environment and enforcement of least privilege is controlled by IAM policies. Privileged actions are captured in audit logs for review and anomalous behavior detection.
Physical and environmental safeguards
Physical and environmental security is handled entirely by our cloud service providers. Each of our cloud service providers provides an extensive list of compliance and regulatory assurances, including SOC 1/2-3, PCI-DSS, and ISO27001.
Google
See the Google Cloud Platform compliance, security, and data center security documentation for more detailed information.
Amazon
See the Amazon Web Services compliance, security, and data center security documentation for more detailed information.
Azure
See the Azure compliance, security, and data center security documentation for more detailed information.
Scaleway
See the Scaleway compliance, security and data center security documentation for more detailed information.
OVH
See the OVH compliance, security and data center security documentation for more detailed information.
Stacksync data residency
Stacksync runs data connectors on servers such as in the United States (US), Canada, European Union (EU), United Kingdom (UK), Australia, Singapore (non-exhaustive list). You can select your preferred data processing location when configuring your Base. All connectors configured in a destination run in the destination's designated location. This means that your data will not leave our region-specific servers during processing. For example, if you configure your destination to use our EU servers, your data will not leave the EU during processing or storage. See our Base and Connected Apps documentation to learn how to configure your data processing location.
Stacksync runs services on Google Cloud Platform (GCP), Amazon Web Services (AWS), and Azure. The following table lists regions supported by Stacksync for each service provider:
*NOTE: Default region for a given cloud provider / geography combination.
IMPORTANT: Google Cloud Platform is the default cloud service provider. You can select a different cloud service provider and region if you are on a plan that allows that option.
Your organization permissions
Only users of your organization registered within Stacksync and Stacksync operations staff have access to your organization's Stacksync dashboard.
Your organization's Stacksync Dashboard provides visibility into the status of each integration, the aforementioned metadata for each integration, and the ability to pause or delete the integration connection - not organization data.
Organization administrators can revoke immediately an organization member’s access to a workspace at any time from the Workspace Settings page. Otherwise, Organization administrators can request that Stacksync revoke an organization member's access at any point; these requests will be honored within 24 hours or less.
Company policies
Stacksync requires that all employees comply with security policies designed to keep any and all customer information safe, and address multiple security compliance standards, rules and regulations.
Two-factor authentication and strong password controls are required for administrative access to systems.
Security policies and procedures are documented and reviewed on a regular basis.
Current and future development follows industry-standard secure coding guidelines, such as those recommended by OWASP.
In the event of a data breach
To date, Stacksync has not experienced a breach in security of any kind. In the event of such an occurrence, Stacksync protocol is such that customers would be made aware as soon as the compromise is confirmed.
Responsible disclosure policy
At Stacksync, we are committed to keeping our systems, data and product(s) secure. Despite the measures we take, security vulnerabilities will always be possible.
If you believe you’ve found a security vulnerability, please send it to us by emailing security@stacksync.cloud. Please include the following details with your report:
Description of the location and potential impact of the vulnerability
A detailed description of the steps required to reproduce the vulnerability (POC scripts, screenshots, and compressed screen captures are all helpful to us)
Please make a good faith effort to avoid privacy violations as well as destruction, interruption or segregation of services and/or data.
We will respond to your report within 5 business days of receipt. If you have followed the above instructions, we will not take any legal action against you regarding the report.
Diagnostic data access
IMPORTANT: Stacksync cannot access your data without your approval.
When working on a support ticket, we may need to access your data to troubleshoot or fix your broken connector or destination. In that case, we will ask you to grant Stacksync access to your data for the next 21 days. You can allow or deny data access. If you grant us data access, you can revoke it at any moment before the 21-day diagnostic period has expired.
See our support documentation for more details.
Questions?
We're always happy to help with any other questions you might have! Send us an email at security@stacksync.cloud
Last updated