Your Timescale data is encrypted both in transit and at rest. Both active databases and backups are encrypted.
Timescale uses AWS as its cloud provider, with all the security that AWS provides. Data encryption uses the industry-standard AES-256 algorithm. Cryptographic keys are managed by AWS Key Management Service (AWS KMS). Keys are never stored in plaintext.
For more information about AWS security, see the AWS documentation on security in Amazon Elastic Compute Cloud and Elastic Block Storage.
Customer access to Timescale services is only provided over TLS-encrypted connections. There is no option for using unencrypted plaintext connections.
When using VPC peering, no public Internet-based access is provided to the services. Service addresses are published in public DNS, but they can only be connected to from the customer's peered VPC using private network addresses.
Normally all the resources required for providing Timescale services are automatically created, maintained and terminated by the Timescale infrastructure. No manual operator intervention is required.
However, the Timescale Operations Team has the capability to securely log in to the service Virtual Machines for troubleshooting purposes. These accesses are audit logged.
No customer access to the virtual machine level is provided.
Customer data privacy is of utmost importance at Timescale. By default, your Timescale data is encrypted both in transit and at rest. To do this, Timescale uses various technical mechanisms, processes, and software development lifecycle practices, to help ensure the security and privacy of your data.
Timescale operators never access customer data, unless explicitly requested by the customer to troubleshoot a technical issue. The Timescale operations team has mandatory recurring training regarding the applicable policies.
Found an issue on this page?Report an issue!