When provisioning access, IT adheres to the principles of least privilege and role-based access control, meaning that employees are only authorized the access and permissions required to fulfill their job responsibilities. User access reviews, including production access, are performed semi-annually. Access to the production infrastructure and supporting systems requires MFA.
Employee access is revoked within two business days of an employee’s termination. In the event of involuntary termination, access is revoked immediately.
Jasper corporate offices do not host any component of the infrastructure or store customer data. Jasper uses GCP as its cloud hosting provider. The Jasper application is hosted across multiple availability zones in the US-East1 & US-West1 regions for increased redundancy.Jasper utilizes serverless instances across GCP to ensure high availability of all services. Kubernetes node components are hardened and have a base configuration image applied.
Jasper retains customer data for the duration of the agreement. Following termination, data is retained in accordance with Jasper’s Data Retention Policy, unless Jasper receives a written data deletion request.
Jasper’s hosting provider, GCP, is responsible for ensuring the proper sanitization of disks and physical media. Jasper sanitizes employee laptops prior to reuse or disposal.
Jasper encrypts all customer data at rest and in transit using strong encryption methods. All information is transmitted via HTTPS using TLS1.2+ with AES256 encryption and SHA2 signatures, defaulting to TLS1.3 based on client ability. Data at rest is encrypted at the storage level using AES256. Database connections are verified using TLS certificates, and encrypted in transit using SSL.
Encryption keys are managed by and stored securely in GCP. Jasper personnel do not have access to the encryption keys. All key usage is logged and monitored for anomalous activity.
Employees are provisioned company-managed workstations. Employees are not permitted to use their personal devices for work (e.g., BYOD). All workstations are configured with disk encryption, anti-malware, password protection, idle lockout, and automatic OS updates. IT monitors employee workstation for deviations to ensure they are compliant with corporate policy.
Centralized logging is enabled for all production systems. These logs are reviewed for indications of compromise and alerted upon. The Security team is responsible for monitoring and alerting thresholds are reached, tracking security events to resolution in accordance with the incident response plan.
Jasper’s firewalls are configured to deny all incoming traffic by default. Firewall rules are reviewed at least annually. Alerts generated by the Intrusion Detection System (IDS) are sent to on-call personnel for investigation and triage. Jasper also utilizes a WAF and CDN in order to both protect against common web application vulnerabilities, like DDoS attacks, and to provide faster access to the application.
Security of the Jasper environment is the shared responsibility of all Jasper employees and contractors who have access to Jasper’s information systems. Prior to their start date, all employees and contractors must have a completed background check on file, as legally permissible. Employees and contractors must also sign a confidentiality agreement, the employee handbook, and Jasper’s security policies.
All employees are required to complete security awareness training upon hire and annually thereafter. Training curriculum includes phishing awareness, remote work best practices, device security, and incident reporting. Developers are required to complete additional training scoped to secure coding practices.
Violations of any corporate policies may result in disciplinary measures up to and including termination.
Jasper has built a secure software development lifecycle (SDLC), including requirements like independent peer code review and automated testing. Non-standard changes go through a change management process that covers emergency changes and hotfixes. The agile nature of the process allows for engineers to follow their own release cycles, deploying continuous improvements to the Jasper application.
All code is managed in a version control repository, with branch protections in place. SAST and DAST are also in place. Access to source code requires MFA.
Jasper partners with third parties to provide key services. Third parties that handle customer personal data, also known as sub-processors, are continuously monitored in order to ensure that their security programs continue to meet Jasper’s standards. Jasper reassesses its subprocessors annually, which includes a review of their independent audit reports and penetration test reports. For the full list of Jasper’s subprocessors, please see legal.jasper.ai/#sub-processors.
Internal and external vulnerability scans are performed weekly. Identified vulnerabilities are remediated in accordance with severity.