Skip to main content

Information Security & Compliance

How is access controlled?

Client-side access is controlled via credentials (username/password) that are shared via a 1-time email link at the time of setup. Internally, access is controlled via secrets file encrypted via GPG keys.

Are there any firewall ports that must be open for its use?

In the US, our Redshift cluster is open to the world on port 5439, although credentials are required to connect. In European Union, we control access via a whitelist.

What types of penetration testing coverage exists?

We conduct general pentesting against all load balancers within the TI infrastructure, including Redshift and NRT BI Connector.

What actions are logged?

Connections are logged (source IP, username), but individual queries are only logged on a performance-impacting basis.

What is reportable to customers regarding actions performed and access granted or data exported/downloaded?

We can only report what IPs connected on what user and when, but not specific data. This data is not exposed in general reporting.

How it is encrypted?

Same as our regular reporting, data is encrypted at rest & in transit via SSL.

What are the access levels or roles available with BI Connector?

We currently offer read-only user access, scoped to your company's data.