Security and Privacy

The entire Worknet team is focused on keeping you and your data safe. We adhere to industry-leading standards to manage our network, secure our application, and set policies across our organization.

Communication & Encryption 

  • All connections to Worknet are encrypted by default, in both directions using modern ciphers and cryptographic systems. We encrypt in transit utilizing TLS 1.2.

  • Any attempt to connect over HTTP is redirected to HTTPS.

  • We utilize AES-256 for all data encrypted at rest.

Penetration Testing

  • Worknet undergoes an annual penetration testing from an outside provider, and regularly installs the latest, secure versions of all underlying software.

Compliance

  • SOC2 Type II: A SOC 2 examination, performed by an independent, certified public accounting (CPA) firm, is an assessment of a service provider’s security control environment against the trust services principles and criteria set forth by the American Institute of Certified Public Accountants (AICPA). The result of the examination is a report which contains the service auditor’s opinion, a description of the system that was examined, management’s assertion regarding the description, and the testing procedures performed by the auditor. dbt Cloud completed a SOC 2 Type II examination, which means its controls were assessed based on their operating effectiveness over the reporting period of January 1, 2021 to December 31, 2021. Our SOC2 Type II is available for review under MNDA upon request.

  • GDPR: Worknet is fully GDPR compliant. Terms of Service includes a Data Processing Addendum that enacts standard contractual clauses set forth by the European Commission to establish a legal basis for cross-border data transfers from the EU.

Data Storage 

  • dbt Cloud stores the following data persistently:

  • dbt Cloud account information including job definitions, database connection information, users, etc. Cloud account information does not include any raw data from your warehouse.

  • Logs associated with jobs and interactive queries you’ve run.

  • Your dbt “assets” which include things like run_results.json and manifest.json.

  • Logs and assets do not include raw data from the warehouse unless the code you write commands it. For example, it’s possible to write dbt code that fetches all customer data from your customer table and writes it to the logs. While that’s usually not a good idea, it is possible, and would mean that information is stored in dbt Cloud.

Asset Management 

  • Laptops are protected by full disk encryption using FileVault2, and managed by Jamf Pro MDM.

Availability, Business Continuity, & Disaster Recovery

  • dbt Cloud is hosted in AWS, with availability in multiple AZ’s (availability zones) in a region.

  • Our retention of backups are a minimum of seven (7) days.

  • Our staff is remotely distributed across the US providing support to customers globally. Our distributed workforce allows us to provide support virtually from anywhere and reduce the impact of support interruption in a geographic location.

Security Protocols

  • dbt Labs is committed to working with security experts across the world to stay up to date with the latest security techniques. If you believe you have found a security vulnerability in dbt Core or dbt Cloud, we encourage you to let us know right away. We will investigate all legitimate reports and do our best to quickly fix the problem. Please review our Responsible Disclosure Policy available at https://www.getdbt.com/disclosure

  • If you believe you have discovered a problem or have any questions, please contact us at security@getdbt.com.

Research and Disclosure

  • dbt Labs is committed to working with security experts across the world to stay up to date with the latest security techniques. If you believe you have found a security vulnerability in dbt Core or dbt Cloud, we encourage you to let us know right away. We will investigate all legitimate reports and do our best to quickly fix the problem. Please review our Responsible Disclosure Policy available at https://www.getdbt.com/disclosure

  • If you believe you have discovered a problem or have any questions, please contact us at security@getdbt.com.