Security & Infrastructure

The most important commitment we have is to the integrity and security of your data.
This commitment touches every part of our infrastructure, our product, and our corporate policies.

Encryption

Encryption means that your data is encoded in such a way that to the naked eye it looks like gibberish.

For example, if you encrypted this sentence it may look like this:

8WAtp8nUEOrzSu67t9tGITEzIdgr6huIpXqofo0rv2w9y3DzSu67A=

Any encrypted data must be decrypted in order to be read. By encrypting your data we’re ensuring that only authorized parties (that’s you!) can read it.

Encryption in transit – We encrypt all data as it moves between our servers and the web browser.

Our API’s are fully encrypted so every request to view or update your records automatically encrypts that data behind the scenes.

Encryption at rest – We encrypt all data that’s stored on our servers.

This includes both the records stored in our databases and search indexes as well as any files and images uploaded to your database.

Bank-level Encryption – We use both SHA-256 and AES-256 encryption, the strongest encryption available.

This is the same level of encryption that banks use.

System Backup

Think of backups like a permanent safety net for your data.

We store multiple copies of every change ever made to your data with the database in multiple locations.

Whether you accidentally delete a single record, or your intern deleted an entire data set when you weren’t looking — we’ll be able to find a backup and restore it.

Restoring from a backup is free.

Active Backups – All recent versions of your records are stored in active databases that can be found and retrieved almost instantly.

The number of changes stored in active backups are based client requirements.

Archives – Older versions of your records are stored in longer term archives.

Restoring from these archives can take much longer but they serve as a great long-term backup.

Encrypted & Redundant – Both our active back-up and archives use the same redundancy and encryption.

This means even your backups will be completely secure and reliable.

Redundancy

Redundancy is usually a negative word: it means no longer useful or necessary.

In the data world, redundancy is very good word. A system with high redundancy means that there’s no single point of failure.

If any one component goes down, a redundant component can step right in with no noticeable difference.

For Knack this means that if one database fails you won’t start hearing from your angry users – other databases will pick up the workload.

Multiple Databases – We mitigate database failures by storing your data in multiple databases, so if one database goes down the other databases can pick up the slack.

Each change made to your database immediately propagates to these redundant versions.

Multiple Locations – Having multiple databases won’t help if they are all stored in a single location. One well placed meteor landing and those databases are gone.

We mitigate location failure by storing the extra databases in different geographic locations.

Offline Backups – we store physical backup files in a separate location from the servers as a final safeguard in case of major catastrophe.

These backups are made on a daily basis and are encrypted using AES-256 encryption keys.

Infrastructure

We use Amazon Web Services to power everything we have to offer. Our clients inherit all the best practices of AWS policies, architecture, and operational processes.

Amazon Web Services is considered the industry leader in cloud services and is trusted by organizations like DOW Jones, Pfizer, and the CDC.

Amazon’s secure data centers enable the redundancy and scaling that equates to a secure and reliable service for all your data needs.

Compliance – AWS environments are continuously audited, with certifications from accreditation bodies across geographies and verticals.

Amazon has achieved compliance with the most strict compliance programs.

DDoS Mitigation – AWS provides a robust platform that is not only pre-built to mitigate some attacks, but it also allows us to react quickly to spread out impact if there is an attack.

We’ve also added safeguards to underlying servers as an additional level of protection.

Built in Redundancy – We use AWS features like Auto-Scaling and Elastic Load Balancing to ensure that our production systems remain online and traffic is always routed to healthy instances.

We continuously replicate your data and have it ready to bring online if any primary nodes fail.

Geographic Distribution – Amazon operates data centers all over the world, adding redundancy and scaling to your data and backups.

SOC 3 and ISO 27001 Certified – We are is automatically certified for many stringent security standards by using AWS as its infrastructure.

Firewalls – We use firewalls to protect every virtual server, database, and load balancer to ensure that only authorized traffic is accessing those resources.

Policies

Security doesn’t stop with infrastructure. Without the right polices around privacy and access, your data can still be susceptible to human error or compromise.

The same amount of attention to infrastructure and technology needs to be allocated to the people and policies responsible for running that technology.

We’ve carefully implemented security policies around your data’s privacy and about how our team can access that data.

Privacy – We maintain a privacy policy that outlines our commitment to respecting your privacy and the privacy of the information in your account.

Ultimately, the data in your account is not accessible to anyone, unless you make it accessible.

Data Ownership – you are the sole owner of your data and completely responsible for it.

We have no ownership of your data and can make no claims on it as long as you are following the terms of agreement.

NDA and Confidentiality – Each  employee signs non-disclosure and confidentiality agreements that provide legal backing for our obligation to keep your data private and confidential.

Development Silos – Our engineers work in a development environment that is completely separated from any live data. This way no bugs or errors have even the slightest potential to affect your data.

VPN Access – All access by employees to customer data is governed by a secure virtual private network. This access is monitored and can be revoked at any time, so even a stolen laptop presents no privacy risks.

Access Logging – Every access request to your data is logged and time-stamped. We can confirm exact access to any data in the unlikely case that this log is needed.

Additional Features

Additional security features like user logins, IP blocking, password and login restrictions are available to integrate within the system depending on your company requirements.

  • Password Protection
  • Password Encryption
  • Roles & Permissions
  • Record Level Security
  • Advanced Logins
  • IP Blocking