Intel Granulate Security Overview

Intel Granulate is listed in the AWS, Google Cloud, Microsoft Azure, Databricks and Red Hat marketplaces and meets the stringent security standards required to be an Intel company.

Our Security Commitment

Security

Intel Granulate is built with security in mind and undergoes ongoing rigorous security testing

Privacy

Intel Granulate offers best-in-class data protection and settings that protect your infrastructure data

Compliance

Intel Granulate’s policies and products are compliant with GDPR privacy regulations

Commitment To The Highest Security Standards

Secure Operations

Intel Granulate adheres to carefully controlled workflows that ensure that all business is executed based on established security guidelines. These workflows include carefully structured reporting lines, data access controls, segregation of duties, security monitoring, and internal audits.

Intel Granulate security policies are designed to adhere to the strict guidelines set by Intel Corporation and internationally recognized security standards- SOC 2 Type II, ISO 27001 and HIPAA

Secure Software Architecture

Intel Granulate architecture is designed around the goals of redundancy, security, and “always on” availability.

Our security design relies on industry best practices such as encrypted transmissions, cross-site scripting prevention, firewalls, regular security updates and security assessments to ensure the security of your data. Auditing, access restrictions and secure decommissioning of data storage complement the design.

Secure Data Centers

All performance data that are collected on the customer side are securely transmitted to our servers in the cloud and processed behind firewalls. Intel Granulate runs on the Amazon Web Services (AWS) cloud-computing service and benefits from Amazon’s secure, world-class data centers, which are certified for ISO 27001, PCI-DSS Level 1, and SOC 1 / SSAE-16.

Security Measures

Data Hosting & Storage

Intel Granulate runs in the Amazon cloud (AWS) cloud infrastructure. AWS security measures provide a high degree of data protection. AWS guarantees physical access controls, hypervisor protection, and secure decommissioning of instance data.

Incident Response

We continuously monitor the security of our hosting environment. In case of security incidents, we thoroughly evaluate detected problems and the underlying root causes as described in our Incident Response Policy.

Permission & Authentication

Direct access to AWS services by our employees is carefully regulated based on multi-factor authentication. Permissions are granted on a “need based access” policy following a thorough approval process.

Monitoring

All systems we run are subject to permanent health and security monitoring.

Training & Awareness

All Intel Granulate employees undergo annual security-awareness training.

Failover & Backups

For high availability purposes we leverage AWS standards, best practices and failover solutions.

Security Testing

The attack surfaces of our services are minimized based on automated vulnerability scans, regularly conducted internal security assessments.

Data Collected

Intel Granulate Agent Collects Resources Data

Data Storage

Intel Granulate offers two different types of deployment models: SaaS and On-Prem.

SaaS – Data is stored in AWS data centers.

On-Prem, your monitoring data remains in your own data center.

Data Transit

All data exchanged between Intel Granulate sAgent and Intel Granulate Cluster is encrypted in transit.

Data is sent using proprietary encrypted binary protocol.

Intel Granulate SaaS uses TLS 1.3 (SSL Labs Grade A+).

Data Encryption At Rest

Intel Granulate SaaS uses AWS storage with AES 256 encryption.

Encryption keys are managed by Intel Granulate using AWS Key Management Service (KMS).

Managed customers must configure their own hard disk encryption and manage encryption keys on their own.

  • Communication Exchange
  • Security Certifications
  • Data Protection
  • Performance Reliability

Communication Exchange

Secure Communication Between Intel Granulate Components

The Intel Granulate sAgent communicates with the gCenter

All communication between the sAgent and gCenter encrypted

Intel Granulate isn’t able to initiate a connection to the customer’s cluster

Types Of Communication

Installation – Account Name, License Name, Installation Flags

Agent Registration – License Key, Service ID

Intel Granulate License – License Status, Service ID, License Key, License Details, License Model

Health Check – Service ID, Time Zone, Traffic Size, Update Window, Performance Data

Metrics – Service ID, Monitoring Timeframes, Success & Failure Alerts, Performance Data

Heartbeat – Service ID, Node ID, Source Information

Updates – Service Updates, Version, Description, Download URL

Security Certifications

Intel Granulate services and data is hosted in Amazon Web Services (AWS) facilities.

The services and facilities of AWS are certified against international standards:

  • ISO 27001 (Information Security Management System)
  • ISO 27017 (Cloud Services Security)
  • ISO 27018 (Personal Data Protection)

Intel Granulate services are designed to adhere to internationally recognized security standards – SOC 2 Type II, and HIPAA.

Intel Granulate is GDPR compliant.

Data Protection

Access Control

  • Our customers individually control access to the data that Intel Granulate has access to.

Monitoring & Audit Logging

  • All systems operated by Intel Granulate are subject to health and security monitoring, logging audit, and automated analysis of system logs.

Data Encryption

  • All electronic communication sent to and from Intel Granulate over HTTPS relies on TLS encryption on the relevant ports.
  • sAgent encrypts all data before they are sent to Intel Granulate Server.
  • Metric and transaction data is encrypted even while at rest, and each customer’s data is programmatically partitioned from the data of other customers.

Data Retention

  • Intel Granulate stores and retains different types of monitored data from your environments (see section ‘Data Collected’ for relevant monitored data).
  • The monitoring data is stored on the Intel Granulate Server for a retention period of 2 weeks, billing data and anonymized aggregations of data are stored for a longer period of time.

Performance Reliability

Business Continuity and High Availability

Intel Granulate sAgent is designed to ensure 99.99999% availability SLA of the customer’s infrastructure.

Intel Granulate leverages AWS fail-over mechanisms to ensure high availability of all services.

Intel Granulate optimization agents are completely autonomous and will continue to work properly even without network connection to the server.

Performance Improvements Guaranteed

Intel Granulate’s sAgent is built with internal high performance gain failsafe mechanisms to prevent performance degradation.

The sAgent holds a performance gain threshold of 65% improvement, below this threshold the agent starts to automatically relearn for a 20 second timeframe to rise above the gain threshold.

Following 3 consecutive failures to return to the 65% threshold, an alert is raised and the agents can be configured to deactivate automatically.

Infrastructure Monitoring

Intel Granulate constantly monitors the availability, performance, and security of all SaaS clusters.

If a problem is detected, the Intel Granulate support team is notified immediately.

On-Prems deployment customers can also choose to monitor by sending regular health checks to Intel Granulate gCenter

Rolling Updates & Hot Fixes

Using a fully automated CI/CD pipeline, Intel Granulate is able to roll out updates and hot fixes within a few minutes.

The Intel Granulate architecture allows for zero-downtime upgrades of clusters and agents.

Updates of Intel Granulate’s sAgent and gCenter can be done both manually and automatically.