The following document is intended to provide a summary of Prosci’s approach to information privacy and security for our client-facing solutions.
Prosci is committed to keeping any and all data we collect from clients safe and secure, following best-in-class industry standards and protocols. To reinforce this commitment, Prosci is certified in the ISO 27001 standard, an international information security standard. Please click here to access the certificate or contact email@example.com for additional questions
Additionally, Prosci uses the following third-party sub-processors to help us provide our services to you. These sub-processors process data that you input into the services, which may include personal data. Like Prosci, our sub-processors prioritize data privacy and, where applicable, have contractually agreed to protect the personal data of Prosci’s customers in accordance with global data privacy regulations and standards. A list of sub-processors is maintained here.
When Prosci designed and developed client-facing solutions, data privacy and security were top priorities. For this reason, we carefully selected partners who could work with us to provide the level of protection we felt was needed.
We selected Salesforce’s Heroku application platform environment to host and manage our solutions. In particular, we chose to invest in Heroku Shield Private Spaces to provide our clients with the most rigorous security and privacy protocol available through Salesforce.
Following that decision, we carefully selected development platforms and development partners who would match this level of commitment to information security. Before any supplier is granted access to Prosci systems, Prosci establishes written confidentiality agreements with the provider.
Following is an overview of the solution security approach based on the Salesforce Heroku platform.
The application code and information database for our hub-based solutions (currently Prework, Knowledge Hub, Research Hub and Proxima) is hosted on Heroku, a secure cloud software hosting platform owned by Salesforce. Heroku is known for its emphasis on security.
Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout the world. The platform is designed to protect customers from threats by applying security controls at every layer from physical to application, isolating customer applications and data, and with its ability to rapidly deploy security updates without customer interaction or service interruption.
Heroku’s physical infrastructure is hosted and managed within Amazon’s secure data centers and utilize the Amazon Web Services (AWS) technology. Amazon continually manages risk and undergoes recurring assessments to ensure compliance with industry standards. Amazon’s data center operations have been accredited under:
Heroku utilizes ISO 27001 and FISMA certified data centers managed by Amazon. AWS data centers are housed in nondescript facilities, and critical facilities have extensive setback and military-grade perimeter control berms as well as other natural boundary protection. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, state-of-the-art intrusion-detection systems, and other electronic means. Authorized staff must pass two-factor authentication no fewer than three times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.
For additional information see: https://aws.amazon.com/security.
Third-party security testing of the Heroku application is performed by independent and reputable security consulting firms. Findings from each assessment are reviewed with the assessors, risk ranked, and assigned to the responsible team.
Automatic fire detection and suppression equipment has been installed to reduce risk. The fire detection system utilizes smoke detection sensors in all data center environments, mechanical and electrical infrastructure spaces, chiller rooms, and generator equipment rooms. These areas are protected by either wet-pipe, double-interlocked pre-action, or gaseous sprinkler systems.
The data center electrical power systems are designed to be fully redundant and maintainable without impact to operations, 24 hours a day, and seven days a week. Uninterruptible Power Supply (UPS) units provide backup power in the event of an electrical failure for critical and essential loads in the facility.
Climate control is required to maintain a constant operating temperature for servers and other hardware, which prevents overheating and reduces the possibility of service outages. Data centers are conditioned to maintain atmospheric conditions at optimal levels. Monitoring systems and data center personnel ensure temperature and humidity are at the appropriate levels.
Data center staff monitor electrical, mechanical and life support systems and equipment so issues are immediately identified. Preventative maintenance is performed to maintain the continued operability of equipment.
Firewalls are utilized to restrict access to systems from external networks and between systems internally. By default, all access is denied and only explicitly allowed ports and protocols are allowed based on business need. From a network perspective, security groups restrict access to only the ports and protocols required for a system’s specific function to mitigate risk.
Host-based firewalls restrict customer applications from establishing localhost connections over the loopback network interface to further isolate customer applications. Host-based firewalls also provide the ability to further limit inbound and outbound connections as needed.
System configuration and consistency is maintained through standard, up-to-date images, configuration management software, and by replacing systems with updated deployments. Systems are deployed using up-to-date images that are updated with configuration changes and security updates before deployment. Once deployed, existing systems are decommissioned and replaced with up-to-date systems.
Applications on the Heroku platform run within their own isolated environment and cannot interact with other applications or areas of the system to prevent security and stability issues. These self-contained environments isolate processes, memory, and the file system while host-based firewalls restrict applications from establishing local network connections. For additional technical information see: https://devcenter.heroku.com/articles/dyno-isolation.
Operating system access is limited to Heroku staff and requires username and key authentication. Operating systems do not allow password authentication to prevent password brute force attacks, theft, and sharing.
The vulnerability management process is designed to remediate risks without customer interaction or impact. Heroku is notified of vulnerabilities through internal and external assessments, system patch monitoring, and third-party mailing lists and services. Each vulnerability is reviewed to determine if it is applicable to Heroku’s environment, ranked based on risk, and assigned to the appropriate team for resolution.
New systems are deployed with the latest updates, security fixes, and Heroku configurations and existing systems are decommissioned as customers are migrated to the new instances. This process allows Heroku to keep the environment up-to-date. Since customer applications run in isolated environments, they are unaffected by these core system updates.
Heroku undergoes penetration tests, vulnerability assessments, and source code reviews to assess the security of our application, architecture and implementation. The third-party security assessments cover all areas of our platform, including testing for OWASP Top 10 web application vulnerabilities and customer application isolation. Heroku works closely with external security assessors to review the security of the Heroku platform and applications, and apply best practices.
Issues found in Heroku applications are risk ranked, prioritized, and assigned to the responsible team for remediation, and Heroku’s security team reviews each remediation plan to ensure proper resolution.
Applications deployed to the Heroku platform are automatically backed up as part of the deployment process on secure, access controlled, and redundant storage. Heroku uses these backups to deploy our Prosci applications across our platform and to automatically bring applications back online in the event of an outage.
Data is stored and managed in Heroku Postgres. Continuous Protection keeps data safe on Heroku Postgres. Every change to your data is written to write-ahead logs, which are shipped to multi-data center, high-durability storage. In the unlikely event of unrecoverable hardware failure, these logs can be automatically 'replayed' to recover the database to within seconds of its last known state. For additional technical information see: https://devcenter.heroku.com/articles/pgbackups.
From our instance images to our databases, each component is backed up to secure, access-controlled, and redundant storage. Our platform allows for recovering databases to within seconds of the last known state, restoring system instances from standard templates, and deploying customer applications and data. In addition to standard backup practices, Heroku’s infrastructure is designed to scale and be fault tolerant by automatically replacing failed instances and reducing the likelihood of needing to restore from backup.
Our platform automatically restores customer applications and Heroku Postgres databases in the case of an outage. The Heroku platform is designed to dynamically deploy applications within the Heroku cloud, monitor for failures, and recover failed platform components including customer applications and databases.
We take steps to protect the privacy of our customers and protect data stored within the platform. Some of the protections inherent to Heroku’s products include authentication, access controls, data transport encryption, HTTPS support for customer applications, and the ability for customers to encrypt stored data. For additional information see: https://www.heroku.com/policy/privacy.
Heroku and our development team staff do not access or interact with customer data or applications as part of normal operations. There may be cases where Heroku or our developers are requested to interact with customer data or applications at the request of the customer for support purposes or where required by law. Customer data is access controlled and all access by Heroku staff is accompanied by customer approval or government mandate, reason for access, actions taken by staff, and support start and end time.
Prosci personnel only have access on a need-to-know, specifically granted-access basis. Prosci will not extract or use customer-specific data except where we have a legal basis to do so in order to fill the purpose for which the data was collected. Prosci will look at meta data so that we can understand which portions of the systems are being used so we can look at how to best meet client needs.
Customer data is encrypted both in transit via HTTPS / SSL and at rest in the database. Common data attributes such as passwords and two-factor authorization secrets are encrypted at rest and filtered out of data logs as part of the respective schemes used to implement those features.
Private Space Logging is a feature that enables us to configure log capture at the space level instead of the app level, thereby providing the ability to separate logs for specified client environments when a client-specific Private Shield environment is requested. For additional technical information see: https://devcenter.heroku.com/articles/logging.
The Prosci hub-based solution set was built on the Heroku-20 Stack. The current support period from Heroku is through a minimum of April 2025.
Heroku Security, Privacy & Architecture (SPARC):
Heroku Private Spaces: