Select Star will never access your data values or run queries against your data unless explicitly authorized by your organization. By default, Select Star’s access and processing are limited to system metadata and query logs only.
If your organization chooses to enable features such as data previews or AI-powered data querying, Select Star will access data values only as necessary to support those features.
We recommend creating a dedicated service account for Select Star with metadata-only roles and permissions, as described in our documentation.
Although we do not have read access to your data values, sometimes Select Star and its users may be exposed to sensitive data. This can happen if a user-executed query Select Star has ingested exposes sensitive data values. For example, Select Star may ingest a query that was executed as "SELECT * FROM Users WHERE SSN='123-45-5678'
".
To prevent this type of scenario, we recommend our customers tag their sensitive columns as “PII”. Once a column is tagged as PII, Select Star will remove any value from the query log before the query gets saved in Select Star for processing.
This way, no sensitive data values are transferred to Select Star and no organization user will encounter queries containing potentially sensitive values.
To learn more about using the PII tag in Select Star, see our docs.
Select Star has been completing annual SOC 2 Type II audit in Security, Confidentiality, and Availability criteria, with no exceptions since May 2021.
SOC 2 is a Service and Organization Control (SOC) governance framework developed by the American Institute of CPAs (AICPA) on storing of private business and customer information by third-party service providers. SOC 2 specifically relates to data security for companies that store client information on cloud-based servers, and hence relevant for Software as a Service (SaaS) providers like Select Star.
Independent auditors use the SOC 2 framework to validate a company’s systems and controls with respect to information security. Upon completion of the audit and a thorough review of the evidence, the auditor issues a SOC 2 report detailing its findings and attestation on the company’s security controls related to areas such as:
SOC 2 has more than 200 of these requirements and mandates long-term policy and procedures to better secure customer information through tightened internal control. SOC 2 Type II audit requires all the controls and systems are effective over a designated period of time, and hence the SOC 2 Type II audit report provides a guarantee that there are organizational practices already running in place to safeguard the privacy and security of all customer information.
SOC 2 Type II audit report, 3rd party pentest report, and summary of technical and organizational security measures for Select Star are all available upon request under MNDA.
Select Star's AI capabilities leverage OpenAI's and Anthropic's GPT technology. OpenAI and Anthropic are SOC-2 compliant vendors, and our security team reviews their SOC-2 report annually.
When using AI features of Select Star, the following data may be shared with OpenAI and Anthropic:
To be explicit, the following data is not shared outside of Select Star:
OpenAI and Anthropic do not store or use any of the above data for training.
Select Star’s AI features (such as Ask AI) can be disabled if customers prefer not to have any metadata sent to OpenAI or Anthropic.
All customer data will be deleted either upon request or following a termination or cancellation of a Select Star account. It may take up to 10 business days to complete the deletion.
Select Star users with an admin role can also remove a Data Source in Select Star application at any time. This will delete all of its metadata, query logs, and any user-created or Select Star-created metadata (i.e., description, comments, tags, popularity, lineage) from the Select Star application.
All customer data deletion is permanent. Once deleted, customer data cannot be restored.
Select Star uses Amazon Web Services (AWS) to host its cloud infrastructure. AWS is a secure cloud services platform, offering compute power, database storage, content delivery and other functionality to help us continue to grow with our customers.
AWS security and operational processes for its network and infrastructure services are documented in here: Amazon Web Services: Overview of Security Processes. This document includes an overview of AWS’s data center controls, including:
Customers can obtain further details of AWS’ compliance and security position via their website at: