What kind of security does Temporal Cloud provide?
The security model of Temporal Cloud encompasses applications, data, and the Temporal Cloud platform itself.
What is the security model for applications and data in Temporal Cloud?
Code execution boundaries
Temporal Cloud provides the capabilities of Temporal Server as a managed service; it does not manage your applications or Workers 🔗
Data Converter: Client-side encryption
The optional Data Converter 🔗
The Data Converter runs on your Temporal Workers and Clients 🔗
The Data Converter also lets you securely decrypt data in the Temporal Web UI 🔗
What the security model for the Temporal Cloud platform?
Namespace isolation
The base unit of isolation in a Temporal environment is a Namespace 🔗
Temporal Cloud is a multi-tenant service. Namespaces in the same environment are logically segregated. Namespaces do not share data processing or data storage across regional boundaries.
Encryption
Communication into and out of Namespaces is over TLS. All communication within our production environments is over TLS 1.3. Data is stored in two separate locations: an Elasticsearch instance (used when filtering Workflows in SDK clients, the CLI, or the Web UI) and the core Temporal Cloud persistence layer. Both are encrypted at rest with AES-256-GCM.
For more information, see Requirements for CA certificates in Temporal Cloud 🔗
Identity
Authentication to gRPC endpoints is provided by mTLS per Namespace.
For more information, see How to manage SAML authentication with Temporal Cloud.
Access
Authorization is managed at the account and Namespace level. Users and systems are assigned one or more preconfigured roles. Users hold account-level Roles 🔗
Monitoring
In addition to extensive system monitoring for operational and availability requirements, we collect and monitor audit logs from the AWS environment and all calls to the gRPC API (which is used by the SDKs, CLI, and Web UI). These audit logs can be made available for ingestion into your security monitoring system.
Testing
We contract with a third party to perform a full-scope pentest (with the exception of social engineering) annually. Additionally, we perform targeted third-party and internal testing on an as-needed basis, such as when a significant feature is being released.
Internal Temporal access
We restrict access to production systems to the small team of employees who maintain our production infrastructure. We log all access to production systems; shared accounts are not allowed. Access to all production systems is through SSO, with MFA enabled.
Access to AWS is granted only for limited periods of time, with a maximum of 8 hours. (For more information, see the blog post Rolling out access hours at Temporal.)
All Temporal engineering systems are secured by GitHub credentials, which require both membership in the Temporal GitHub organization and MFA. Access grants are reviewed quarterly.
Compliance
Temporal Technologies is SOC 2 Type 2 certified and compliant with GDPR. Compliance audits are available by request through our Contact page.