Security

At North.Cloud, security is fundamental to everything we do. Our approach is multi-layered, with clear delineation of security responsibilities and controls at every level of our service.


Security Levels & Best Practices

Platform and Architecture Security

  • Dedicated Environments: Our AWS-based infrastructure is strictly segregated into separate environments for development, testing, and production. This ensures changes and experiments in non-production environments can never impact production or customer data.

  • Least Privilege Permissions: All IAM roles and policies are locked down using the minimum privileges required. No permission is ever granted unless it is strictly necessary for North to operate our service.

  • Internal Security Audits: Every significant new feature or architectural update undergoes internal security review to identify and address risks at design and implementation time.

  • External Security Testing: North contracts third-party SecOps professionals for regular penetration testing, including both black-box and gray-hat audits, to probe and validate the security of our production system.

  • Comprehensive Logging & Auditing: Every environment is continuously logged and monitored. Audit logs for all customer environments are maintained and can be made available for review by customers on request.

  • SOC 2 Type I Compliance: As of May 2024, North has completed its SOC 2 Type I audit. Full details of our compliance, including audit reports, are available to customers with a signed NDA—just reach out to our security team to request them.


Customer Data Segregation & Controls

Strict Account Isolation & Data Segregation

  • One Billing Account per North Account: North enforces a policy of one cloud provider billing account ID per North.Cloud account. This strict separation makes it impossible for cross-customer data access or account impersonation within our platform.

  • Root User Controls: Within each customer organization, we allow only one root North user per company domain. This increases control and minimizes the surface area for insider risk or account misuse.

  • No Data Leakage: There is no mechanism for data to transfer or be accessed between North.Cloud accounts. Customer workloads, savings plans, and reporting are all strictly isolated.

  • Request Security Info: Need more information? We provide detailed documentation and audit trails on a per-request basis for customers (subject to appropriate NDAs).

Last updated

Was this helpful?