Ascend is a SaaS offering that runs in a native cloud environment (AWS, Azure, and GCP) as a private and isolated (single-tenant) deployment. Ascend employs a microservices architecture built on Kubernetes & Apache Spark composed of multiple cloud-hosted Kubernetes clusters designed for on-demand processing at near-limitless scale. This is not a multi-tenant architecture and data is not shared between tenant environments.
Ascend provides industry-leading features that ensure the highest levels of security for your account and data, as well as all the data you store in Ascend.
The following provides a high-level summary of the features, grouped into the following categories:
- Data-at-rest is encrypted using AES 256 (FIPS 140-2)
- OAuth integrations are used for application authentication
- Cloud provider KMS (AWS, Azure, GCP)
- Application level security employs a role-based access (RBAC) model
- Intrusion Detection (Falco)
- All network connections are secured with TLS 1.2+
- Service-based Certs & ACLs
- Private Datastore Connections (Enterprise only):
- SSH Proxy
- VPN using IPSEC
- VPC Peering
- VPC PrivateLink Gateway
- Annual 3rd Party Penetration Tests & Audit
- HIPAA compliant
- SOC 2 Type I Compliance
For ease of operations, Ascend can host your environment in an Ascend-owned cloud account. You may still request a specific cloud and region for deployment.
In this deployment model, the environment Control Plane and Data Plane both live in an Ascend cloud account, but is still maintained as a single-tenant deployment.
This is Ascend's "Standard" method of deployment in which Ascend deploys your environment into a cloud account that you own. This enables you to meet additional security and compliance restrictions, as well as take advantage of existing cloud commitments and discounts.
Note: this deployment model is required if you want to use the Enterprise Security package.
In a Customer Hosted Standard deployment, you may upgrade to the Enterprise Security package in order to use enhanced capabilities for securing to meet compliance requirements, as well as connecting your environment with additional parts of your infrastructure.
In Customer Hosted deployments (with or without Enterprise Security), Ascend will still manage the operations of your environment infrastructure (including infrastructure maintenance/upgrades, security patches, and software deployments).
Ascend performs annual pen tests with 3rd party firms.
Senior Management maintains and communicates incident and breach response policies to Company personnel. Employees are trained during the initial on-boarding process about the procedures for identifying and reporting incidents. Internal monitoring tools are configured to notify and alert the Engineering team of security and availability events that require investigation and/or resolution.
Notifications and alerts come from various channels that include customer support, automated security scans, monitoring, and logging tools. In order to ensure that incident response is consistent and proper, incident response procedures are documented internally, accessible within Ascend as a reference guide. Depending on the severity of the incident, communication is established between Senior Management, Engineering, and Security. Ascend performs post-mortems to assess and remediate the root cause of these incidents.
To ensure protection with vendors related to security incidents, data protection agreements are required with applicable vendors and they must inform Ascend of any breach or security incident impacting the Platform or its customers. Ascend customers are notified directly via email of any identified security breaches impacting their systems.
Ascend has designed and configured the Platform for regional high availability and redundancy. Environment data is backed by the durability guarantees of highly redundant systems such as GCS, S3, and Azure Blob Store. Regular snapshots of production databases are configured to be taken nightly and stored encrypted at-rest using standard AES-256 encryption. Ascend performs restoration tests at least annually to ensure data can be recovered from backups and ensure continuity.
Operations, Engineering, and Security teams maintain a disaster recovery plan and exercises it at least annually. Testing is done to ensure that recovery procedures work as intended. Restoration procedures for backups are performed and tested annually.
Ascend deploys a multi-AZ infrastructure for all real-time services, while asynchronous computation services are deployed in a single-zone cluster (optimized for cost and infrastructure packing efficiency). In the unlikely event that there is a geographic event affecting one datacenter, you will not lose access to interactive services.
Ascend management performs a review of third-party vendors and business associates that will have access to production systems or data to ensure the protection of customer data and Ascend systems. Prior to engaging with a potential vendor, the first step requires that Ascend personnel seeking to engage with a vendor check their references and assess whether the vendor is a fit. The second step is to collect relevant security documentation and certification reports from the vendor and identify areas where their controls do not align with Ascend security and privacy policies. The third step is to perform research to ascertain if the vendor has a history of customer complaints or issues with delivering services such that its reputation is under risk.
Before beginning a third-party relationship, management will assess risk related to the relationship being contemplated. The planning includes, but is not limited to, (1) assessing the extent to which the relationship complements Ascend’s business objectives, philosophy, and long-term goals, (2) comparing the risks and benefits of outsourcing business functions with the risks and benefits of maintaining those functions in-house (3) assessing expertise to manage and monitor the relationship and (4) determining an exit strategy to plan for the contingency of exiting the relationship if it becomes necessary to change course in the future.
- Cloud Vendors: AWS, Azure, GCP
- Monitoring providers: Sumo Logic, OpsGenie
All providers have the same, or greater SOC 2 TYPE 2 certifications. Per HIPAA requirements, we instantiate BAA's with all vendors who handle customer data.
Background checks are performed before employees join Ascend and cover criminal history, sex offender status, and global watchlist.
Employees in their first week must read and sign Ascend’s Infosec policy and go through HIPAA training. The Infosec policy covers security policies for both digital and physical environments.
The Ascend architecture provides each customer their own deployment in a fully isolated cloud account with no shared resources or access.
Similar to other cloud services (e.g. AWS, GCP, Box, Salesforce), certain Ascend employees (no 3rd parties) have access to the customer environment which stores data, which may contain PII/PHI data (if it were uploaded to the system). Access is limited to those necessary to ensure the service is available, up to date, and meeting customer expectations.
Logs are retained for 90 or more days for all systems, but log data can be made available upon request if necessary. Additionally, Ascend offers a security suite that includes monitoring, notification, and audit capabilities that allow customers to record all user and system activity in their own independent systems.
Ascend supports OAuth2 SSO providers. We also provide a variety of security control measures inside of the product to limit user (ie, your users) access to only appropriate data. This allows you to easily segment data and dataflow access by role or group within your organization while supporting cross-team workflows.
Ascend is designed for 24/7/365 uptime, and as a result we do not have regular maintenance windows that impact the service.
Ascend's front-end (UI/API) uptime SLA is 99.9%
We ensure HA at a number of layers in our technology:
- Ascend runs the control plane components of our systems in multiple availability zones, which are resilient to the loss of any AZ.
- Ascend data storage uses cloud object stores (S3, GCS, etc) which all provide high data durability (99.999999999% or higher).
- Our infrastructure runs on Kubernetes (across these AZs) and are resilient to the loss of any (or many) underlying servers.
- Ascend databases all have hot standbys, in a different AZ, with auto-failover. Additionally, databases take daily snapshots.
Expired and replaced data (previous versions of data partitions) are by default retained for 24 hours after they are no longer in use, after which it is garbage collected and permanently deleted. Customers may request for a different retention period if required. Active data will continue to be stored as a dataflow dependency.
If service is terminated, users are able to copy / replicate their data. Data is stored in snappy.parquet files, but users can select other formats such as CSV, TSV, JSON, etc.
Updated 2 months ago