Document toolboxDocument toolbox

CallPotential Security Summary

 

RETURN TO THE MAIN SUPPORT PAGE

 

CallPotential's application makes extensive use of our customer's data and as such, protecting the data we store, transmit and manipulate is mission critical to the success of our company. CallPotential continually strives to be an active participant in the AWS shared responsibility model and implement security measures as a core component of our platform.

 

How Customer Data is Obtained

While some of the sensitive customer data is entered by users into our application directly, much of the data is obtained through API access provided via property management software. While each system is implemented differently, there are some key principles that must be adhered to;

  1. Data may not be physically stored in local storage on servers processing data.

  2. All communications between 3rd party systems and CallPotential servers must be encrypted using SSL/TLS1.2 or higher.

  3. SSL/TLS1.2 or higher connections are required to access CallPotential databases and data stores.

  4. Services may not cache data locally or create local copies of any data.

 

How Customer Data is Stored

The source of truth for Customer data is our production database housed in AWS Aurora. Elastic search, used to provide caching of Customer data and long CP historical data is provided via a managed service.

In addition to the application database, CallPotential uses Snowflake data warehousing to power its reporting and BI offering. Customer data is pushed into Snowflake at a routine interval using an SSL/TLS1.2 or higher connection from within the CallPotential application's Virtual Private Cloud (VPC) with no intermediate caching of data. Data housed in Snowflake is not accessible to CP services or CP personnel except for those working on the data team. Snowflake data is only accessed via the BI tools we provide in the application.

 

Who and What can Access Data

Support personnel when troubleshooting Customer data may access Customer data using the read-only access provided to them. Access is granted on an individual basis using unique credentials.

Production data may not be downloaded, installed into local development systems, copied or cloned for any reason. We've established development data for this purpose.

Non-production environments may not have access to production data. Conversely, production environments shall not have access to non-production data.

 

How Data can be Accessed by People

All data accessed by people must be accessed via the provided ssh tunnel. Keys are generated by engineering and handed out to individuals. The bastion host shall be the only means to access data outside the platform.

 

How Data can be Accessed by the Platform

Data is only to be accessed by application services and code contained within the AWS VPC. Any components housed outside the VPC (CDNs, client-side code, etc) will never have direct access to the data. The CallPotential infrastructure establishes a network security layer preventing external access and security groups restrict access within the VPC to platform components which need data access.

 

External References

AWS

Snowflake

 

Twilio