Security
How Chalk protects your data.
Chalk enables innovative machine learning teams to focus on building the unique products and models that make their business stand out. Behind the scenes Chalk seamlessly handles data infrastructure with a best-in-class developer experience.
Chalk is both a framework and a platform — developers can write code using familiar Python packages, and deploy that code to Chalk’s platform. Chalk infrastructure executes-customer defined pipelines to compute “feature” data for machine learning applications. Chalk then serves this data back to customer applications for online inference and to customer data teams for training set generation.
Chalk was built to help answer the world’s hardest questions. By democratizing access to machine learning, we hope to do just that.
Chalk was founded and is based in San Francisco, with our primary office in the Mission District.
At Chalk, protecting customer data is core to our mission. It goes without saying — a culture of security is required to earn the trust of organizations that are solving important problems. Consequently, we integrate security best practices into every aspect of our operations and product development and continuously work to harden our security.
Chalk adheres to a program that protects confidentiality, integrity, and availability of data. We have developed information security policies, updated at a minimum on an annual basis, to enforce best practices across access control, risk management, change management, incident response, and other critical areas. We align our policies with standard industry frameworks and our controls are certified via a SOC-2 Type 2 assessment and ISO/IEC 27001:2022 assessment. You can request a copy of our SOC-2 Type 2 certified report, ISO 27001 certificate, Information Security Management System (ISMS) Policy, or any other security-related documentation by contacting security@chalk.ai.
Chalk’s security starts with the people who work here. We maintain strict standards for hiring and all employees undergo background checks prior to employment. During onboarding, we require employees to sign a Code of Conduct and an Acceptable Use Policy. Periodically, we evaluate employee performance in order to ensure alignment with our objectives. Employees who fail to comply with policies are subject to disciplinary procedures up to and including termination.
Chalk takes the protection of customer data seriously. We recognize that failing to protect production customer data is an existential threat to our business. To that end, Chalk strictly forbids storing customer data on company workstations, laptops, or removable media. Customer data is stored exclusively in production data environments.
In addition, Chalk maintains strict controls for production systems. Chalk employees are not permitted to access Chalk production systems via mobile devices. All access to production systems is gated via IAM grants which require justification. Furthermore, access is only permitted on computers that are verified to comply with our endpoint standards. No customer data may be transferred to employee workstations.
Customer data is logically segregated and encrypted at rest and in transit. We use a multi-tenant database for metadata and configuration, and feature engineering data is stored in isolated single-tenant stores.
Chalk infrastructure is hosted in AWS and GCP and relies on their respective physical and environmental security controls. Their security is described in detail in the AWS and GCP security documentation.
Our production VPC networks are segregated from development and staging networks, and utilize strict firewall controls to prevent any unauthorized access.
We use separate AWS accounts and GCP projects for segregated environments, and strictly control IAM access to environments using the principle of least privilege.
At Chalk, we use encryption mechanisms to protect customer data. Chalk makes use of GCP and AWS services to manage encryption of data at rest and in transit. Data at rest is encrypted using AES 256-bit encryption. Data in transit is protected using TLSv1.2 or higher, and we require modern cipher suites for all connections.
Chalk uses the IAM capabilities of GCP and AWS to manage users who have access to Chalk’s production environments. We use auditing tools to verify that the principle of least privilege is followed, and we use granular service accounts to enforce separation of duties. Access privileges are reviewed at least quarterly.
Chalk maintains explicit policies for data retention and deletion. We retain customer data for as long as is needed to satisfy contractual obligations with our customers, or in accordance with regulatory frameworks. We maintain corporate data for periods that are defined by relevant business stakeholders in accordance with business objectives.
Chalk performs daily automated backups of systems that hold customer data.
Chalk invests heavily in extensive monitoring, observability, and alerting for our production environments. We make use of several tools, including Datadog’s SIEM solution.
We rely on audit logging capabilities from AWS and GCP to keep a record of all production access grants, which includes access that would allow an employee to view customer data. Administrative activity in AWS and GCP is logged and retained immutably.
Alerts are configured for important production systems and functionality. Critical alerts are actioned immediately, with pages going out to our 24x7x365 on-call rotation.
Chalk evaluates third-party sub-processors and vendors according to a risk-based framework. We assess their privacy, security, and confidentiality processes in order to confirm that they will not impact our responsibility to protect customer data and provide a highly-available service.
Vendors are reviewed on a yearly cadence. We evaluate factors like the sensitivity of data stored on the service, criticality of our dependence on the service, and the reputation of the service. A current list of our sub-processors is available here.
Chalk utilizes an agile methodology for software development, and performs extensive code reviews and testing before each release.
We adhere to industry best practices, which include mandatory PR approvals, automated code review, a suite of integration and unit tests, and preview deployments to non-production environments for manual QA.
Developers are trained to adhere to secure coding guidelines, and are aware of the OWASP Top 10 issues. Security-sensitive code is always reviewed by domain experts.
Chalk follows a documented Incident Response Plan which is aligned with the SANS Incident Handlers Handbook.
Our plan includes steps for initiating the response plan, escalation to relevant leadership stakeholders, triage, investigation, analysis, mitigation, restoration, and post-mortem. Our engineering team works to monitor potential security issues proactively, and takes all reports of security-related issues very seriously.
Our 24x7x365 on-call rotation is available for customers to report security incidents. Reports should be made to security@chalk.ai, or through other contracted support channels.
Chalk will notify impacted customers of any security issues in a timely fashion.
Chalk has developed a Business Continuity and Disaster Recovery Plan. We perform an annual review and trial run of the plan, and work to ensure that we are able to resume business operations from backup locations, establish communication among core team members, and perform backup restorations successfully.
Chalk maintains a Security Awareness program as part of our onboarding and annual review cadence. All employees are required to participate in order to ensure that they are aware of and understand the policies and procedures that they are required to abide by.
Developers are educated on OWASP Top 10 issues, and other secure coding concepts.
Chalk’s goal is to make it as easy as possible to deploy production-grade machine learning pipelines. We understand that we must earn and keep the trust of our customers in order to succeed in our mission. As such, we have implemented policies and procedures which reflect today’s best practices, and we are committed to evolving our standards to always reflect updated security best practices.
If you have any questions, please reach out to us at security@chalk.ai, or by contacting your Chalk relationship manager.