Rapid7 Platform Cloud Security Overview
Rapid7 Platform Cloud Security Overview
Overview 3
Data Collection 4
Credential Storage 6
Data Processing and Storage 7
Access to Data 9
Application Security 10
Cloud Security Architecture and Governance 12
Compliance 15
The Rapid7 Insight cloud provides data collection, visibility, analytics, and automation to establish a shared point-of-view
between security, IT operations, and development teams. Our cloud platform delivers one-click access to Rapid7’s vulnerability
management, application testing, incident detection and response, and log management solutions. This document introduces
the architecture, security mechanisms, and technical foundations that make up the Rapid7 Insight cloud.
Collectors were designed with the following core tenets in The Insight Agent authenticates using TLS client
mind: authentication. When you deploy the Insight Agent, the
deployment includes a private SSL key representing your
organization. This key is used to authenticate and authorize
• Only administrators can configure collectors. your agent with the Insight cloud.*
• All data is secured during the transmission process,
which uses strong encryption protocols. The agent can communicate directly to the Insight cloud,
• Data transferred from each separate collector is uniquely or proxy communication through existing web proxies or
collectors on your network. Finding the best route to the
identified and stored and cannot be accessed by any
third parties. Insight cloud occurs automatically or can be configured in
advanced use cases.
During installation, a collector reaches up to the Insight
cloud and hands off the shared secret (activation key) by *For InsightOps log data, an API token is used to
performing a challenge-response handshake. Once the authenticate the Insight Agent instead of TLS client
initial handshake is complete, a unique pair of cryptographic authentication. Log data is encrypted in transit via TLS.
keys will be generated. These crypto keys are used for all
subsequent collector to Insight cloud communications.
Scan Engines
The collector relies on a TLS connection (HTTPS) to On-premises scan engines are used by InsightVM and
communicate with the Insight cloud. Specifically, the InsightAppSec to scan Rapid7 customers’ environments
collector is explicitly coded to trust only certificates that by finding and remotely connecting to systems to retrieve
have a signature chain that can be vetted by one of the Java asset information.
trust store Certificate Authorities (CAs). Once the challenge-
response handshake is complete, the collector is ready to
InsightVM scan engines perform vulnerability scans of your
accept command and control instructions from the Insight
networks and report results back to the InsightVM console
cloud. For security reasons, the collector always reaches
using TLS 1.2 (HTTPS). Engines can be distributed across
out to the Insight cloud; the Insight cloud cannot reach
internal networks, public networks, and cloud providers.
through the client’s firewall and initiate a conversation.
Scan engines provide strategic views of your network
from an attacker’s perspective. In deciding how and where
Rapid7 Insight Agent to deploy scan engines, you choose how you would like
to “see” your network. Scan engines can be configured
The universal Insight Agent is lightweight software you to perform authenticated scans to check for software
can install on any asset—in the cloud or on-premises—to applications and packages and to verify patches.
easily centralize and monitor data on the Insight cloud. The
Insight Agent gives you endpoint visibility and detection by InsightAppSec scan engines allow scanning internal web
For details on the collection methods and specific data collected for each product, please visit help.rapid7.com.
To generate value and collect data, our products require access to credentials with a high level of privilege on your networks.
Credentials are stored differently depending on where and how they are used. Credentials are always encrypted before being
stored in the Insight cloud. Where possible—such as when collecting data with collectors—credentials can only be decrypted by
on-premises components and not the Insight cloud itself.
Collectors Orchestrators
All credentials used by a collector to obtain data from your The Insight Orchestrator protects credentials similarly to
local environment are strongly encrypted in a manner that collectors. As part of registration with the cloud, orchestrators
prevents the passwords from being decrypted based on the generate RSA 4096-bit private and public keys. Only the
information stored in the cloud. Every collector installation public key is uploaded to the cloud, while the private key is
generates a unique public/private key pair that is then split stored locally on the orchestrator. When added, credentials
across environments. The public key is uploaded to the are encrypted using the orchestator’s public key. The Insight
cloud, and the private key is stored locally on the collector. cloud will transmit-as-needed the encrypted credentials to
When writing the private key to the local disk, the collector the Insight Orchestrator, where they can be decrypted using
encrypts the private key contents. The private key can only the orchestrator’s private key and used to communicate
be decrypted using information obtained via successful with third party integrations in a secure manner.
communication with the Rapid7 Insight cloud, thus only
active, live collectors with healthy communication with Orchestrators only utilize credentials specifically encrypted
the cloud can access the private key. for them, and are only issued encrypted credential data that
is relevant to the current set of tasks.
Whenever a credential is added to a collector, the credential
is encrypted using an RSA 4096-bit public key associated
with the specific collector where the credential is being
Cloud Collection and Integration
deployed. It is then persisted in the database within a
Credentials used for cloud based data collection or
client-specific database schema. Once the credential
cloud based integrations are securely stored within the
is stored, the Insight cloud no longer has access to the
Insight cloud. Credentials are encrypted using AWS Key
cleartext credential. When that particular collector needs
Management Service (KMS) and the ciphertext is stored in
to use a credential, the encrypted password is retrieved
the Insight platform. Credentials are decrypted using KMS
from the cloud, and decrypted within the collector using
when needed and the cleartext is temporarily stored in
that collector’s private key. The password is used in memory
memory, never written to disk.
and cleared without ever being stored to disk. A collector
can only request access to the credentials necessary for
the event sources configured on that collector. For example, the Insight cloud stores credentials to enable:
Rapid7’s commitment to helping security and technology practitioners reduce risk requires us to collect and process an enormous
amount of data. The Insight cloud’s analytics engine relies on various NoSQL and relational databases, as well as S3 and other
AWS services to process and store your data.
The Insight cloud offers different regions for storage to help Data sent to and from the Insight cloud—including data
you comply with policies or preferences for the physical collected by collectors, agents, and engines; data ingested
storage location of your data. Customers can select from via APIs and plugins*; and interaction with the user interface
five cloud regions. Rapid7 will not move data from the —is encrypted with TLS (HTTPS). Collectors, agents, engines,
region you select, and data is not replicated across other and plugins are configured to verify and require a valid TLS
regions.* certificate issued by a trusted certificate authority.
• United States *InsightOps libraries allows you to send data encrypted with TLS,
but you can also send log data over unencrypted connections to
• Canada support legacy connections.
Ensuring your data is used only in a manner consistent with your expectations is a responsibility Rapid7 takes very seriously.
For this reason, policies including two-factor authentication, jump hosts, service segregation, and per-service permissions
ensuring least-privilege access methodologies are applied.
Rapid7 may collect certain types of data to help us improve • Sales, Marketing, and other customer support
our solutions and services. We have defined rules for what, teams have access to contact information, sales
when, and how we use this data. data, and Usability Data for product support and
product analytics.
Security System Data • Sales and Solution Engineers only have access to
your Security System Data if you choose to use a
This data is collected to deliver the Insight cloud platform.
production environment for a proof-of-concept.
The elements collected vary by product and include data
such as user, network, vulnerability, incident, asset, and
log data. This data resides on the Insight cloud and is what
• Support, Software Developers, and Operations
Engineers have limited access to data to support
populates the dashboards and products you use. Rapid7 application development and troubleshooting.
will never sell, rent, or trade your Security System Data. Rapid7 collects Usability Data to help us improve
our solutions and services and Security System
Data to deliver the Insight cloud.
Usability Data
In order to provide our solutions and services to you, we
must collect certain usage data. This helps us ensure that Access Control
our solutions and services are operating correctly and
that you are having the best possible experience with our Rapid7 provisions all network and application access
products. The types of Usability Data we collect include: using the principle of least privilege. All access requests
are documented and approved by system owners. Reviews
• Device
of Insight cloud production access are conducted quarterly
and connection data (e.g. browser type,
by the Cloud Operations team to ensure the level of access
operating system version, network speed)
is commensurate with least-privilege required to perform
• User and system behavior (e.g. commonly used job responsibilities.
features, user activity, configuration process)
• Product logs (e.g. web server, java, and Rapid7 Additionally, Rapid7 requires two-factor authentication
for remote management access to our jump hosts and
generated logs for troubleshooting)
our backend production systems and environments.
• Organizational data (e.g. customer industry, In accordance with NIST recommendations, Rapid7
location, number of users) explicitly disallows SMS and phone call-based two-factor
• Other relevant machine data authentication for remote management. This two-factor
authentication includes multiple factors at each step
(e.g., connection to jump host AND connection to
We collect data about the solutions you use and how you
backend servers). VPN or direct corporate LAN
use them, such as how often you access our products
access is required before connecting to jump hosts,
and which features you use most frequently. This is done
and a valid jump host session is required before
in an effort to improve your experience with our solutions.
connecting to any production infrastructure.
For example, we may use this data to highlight additional
capabilities or offer tips relating to features you are already
using, to make our solutions more intuitive, or to enhance
the solution’s most popular features. The Usability Data
collected never includes Security System Data such as
user, network, vulnerability, incident, or asset data.
Rapid7 products on the Insight cloud are designed to fit securely into your environment and adhere to security best practices.
Rapid7 takes several steps to protect against common attack vectors and regularly performs application security testing,
vulnerability scanning, and penetration testing.
Products that authenticate via the Insight cloud share The Insight cloud supports global roles that apply to all
the same user database and authentication mechanisms. products* on the Insight cloud platform, and specific roles
Customers who use multiple Insight products benefit applicable to specific products. Rapid7 is always working to
from the Insight cloud’s single sign-on (SSO) functionality, add new roles and permissions to our products, including
needing only to sign in to the Insight cloud platform once the ability to customize RBAC for your needs.
to access all of their Insight products. Additionally,
customers can customize some aspects of their user
Global Roles:
account authentication policies, such as multi-factor
authentication prompt settings. User account credentials
for the Insight cloud are hashed using Bcrypt with a high
• Platform Admin: Full control over all products.
Platform admins have full access to user management,
number of iterations to protect the credential. including adding and deleting users, viewing all data,
and performing all functions. This role can also
Web application sessions are maintained via a randomly manage product trials.
generated session ID that is at least 128-bits in length.
Sessions are protected against session fixation by assigning • Product Admin: Full control over a single product.
Product admins can view all data, perform all edit
a new session ID when authenticating. Sessions IDs are
functions, and access any admin functions within
exchanged via HTTP cookies. Session Cookies have the
their product.
“Secure” and “HttpOnly” attributes set, ensuring session
IDs are only transmitted over HTTPS and preventing • Product Read/Write User: Able to access all or most
client-side scripts from accessing the cookie. Sessions features within a product except for administration of
expire after 30 minutes of inactivity. users and some settings. Able to modify data and/or
some settings.
Customers with on-premises InsightVM consoles
authenticate to the Software-as-a-Service (SaaS)
• Product Read-Only User: Able to access some
features within a product with read-only access.
portion of InsightVM via their console. The InsightVM
console supports local authentication, LDAP, Active *
RBAC for InsightVM is controlled via the on-premises InsightVM
Directory, SAML, and Kerberos authentication. Local console. InsightVM uses customizable fine grained roles and
two-factor authentication can be enabled as well. permissions that differ from the global roles above.
User account credentials used for local authentication
to the security console are salted and hashed, with
RSA being employed as part of the hashing process.
AWS network infrastructure leverages proprietary DDoS Amazon EC2 VMs running the Rapid7 service cannot send
mitigation techniques developed as a result of running spoofed network traffic. The AWS controlled, host-based
the world’s largest online retailer and providing cloud firewall infrastructure does not permit an instance to send
infrastructure for many large enterprises and governments. traffic with a source IP or MAC address other than its own.
Additionally, AWS’s networks are multi-homed across a
number of Internet service providers to achieve Internet
access diversity. Insight cloud services scale horizontally
behind load balancers to further mitigate DDoS attacks.
In addition to designing security into each layer of our products, Rapid7 also builds security into every aspect of our architecture
that hosts the Insight cloud. Misconfiguration of cloud infrastructure continues to be a leading attack vector against SaaS
companies. This section describes how Rapid7 implements, validates, and monitors the cloud security architecture to
minimize this risk.
AWS account separation and access: The Insight cloud uses a microservice architecture consisting of several
small services working together. These services are logically separated into several different AWS accounts to
minimize the blast radius of security incidents. Each AWS account contains a grouping of related services that provide
a single product or product feature. Developer and operations employees are granted least privilege access to each
AWS account individually as needed to perform their jobs. Employees access AWS consoles and APIs via Rapid7’s
corporate SSO system, which requires two-factor authentication. VPC networks are not peered across accounts. Cross-
account communication is permitted where needed using least-privilege IAM roles or authenticated REST services. No
direct database access is allowed between accounts.
Subnet separation: Several different network subnets exist within a single account. Services are provisioned to the
appropriate subnet for their purpose. For example, databases are placed in a subnet with no route to the Internet to
mitigate the risk of data exfiltration.
Host-level firewalls: Each set of identical Insight cloud services are assigned to a separate security group, which acts
as an independent firewall for that service. Security groups deny network traffic by default, so all network traffic rules
are whitelist-based and are defined to allow services to communicate with each other using only the specific ports
and protocols necessary for them to function together. This mitigates the risk of lateral movement between instances
comprising each Insight cloud service.
Service-level roles: When Insight cloud services need to access AWS services, (e.g. S3, KMS, SNS/SQS, etc.), their
access is permitted via IAM roles attached to each group of identical services. Credentials for these roles are
managed by AWS and regularly rotated. These roles allow least privileged access to cloud resources. Each service
type has its own IAM role. For example, if a microservice needs access to read from S3, its IAM role would only permit
reading from a specific S3 bucket. No write access would be permitted.
Scoped external access: IAM roles are used to access AWS resources where possible. When IAM keys must be used,
different keys with least privilege access are issued for different tasks.
Centralized logging: We store and retain logs centrally for security, compliance, and operational needs. These
centralized logs cannot be altered after they have been submitted to our logging system.
Non-Functional
Architecture Automated Functional
Staging Continuous
Testing
Analysis Code Analysis Validation Monitoring
(Automated & Manual)
Functional Continuous
Planning & Cost Non-Functional
Code Review Testing Security
Discovery Analysis Evaluation
(Automated & Manual) Assessments
Rapid7’s Cloud Operations team manages the operational Rapid7 scans for several rules including appropriate
development. The Cloud Operations team develops tools, controls from compliance benchmarks such as CIS AWS
which automate and validate that proper configurations Foundations and AWS Well-Architected Framework. Some
and software are installed in a standard manner, based notable examples of checks scanned for are listed below:
on host classes, and updated regularly.
Emergency, non-routine, and other configuration changes Rapid7 ensures cloud actions are logged and monitored.
to existing Insight cloud infrastructure are authorized, All AWS API actions are logged. Access to servers and
logged, tested, approved, and documented in accordance services are logged to external systems to prevent
with industry best practices for similar systems. tampering. Logs are analyzed by Rapid7’s own products
(InsightIDR and InsightOps) for notable events. Rapid7’s
Managed Detection & Response services team works
Updates to Rapid7’s infrastructure are done in such a with our internal Security Operations team to monitor
manner that in the vast majority of cases they will not these events 24/7 and investigate any alerts.
impact the customer and their service use.
Rapid7 can provide a SOC 2 Type II report covering The EU’s General Data Protection Regulation (GDPR) has
InsightIDR, InsightOps, InsightVM, InsightConnect, imposed obligations regarding the processing, storage, or
and InsightAppSec under NDA. This report is a transmission of personal data of individuals residing in the
representation of Rapid7’s overall security posture European Union (EU). Rapid7 has a Data Protection Officer,
and controls. and has implemented controls across our organization so
that we can better achieve and maintain compliance with
this framework.
AWS SOC Reports
The Insight cloud is hosted by AWS. You can retrieve Rapid7 has a Data Processing Addendum which is
AWS compliance reports (SOC 2, SOC 3, FedRAMP incorporated into its standard contracts to comply with
Partner Package, ISO 27001:2013 SoA etc.) here: GDPR. You can find Rapid7’s Data Processing Addendum
aws.amazon.com/artifact. at www.rapid7.com/legal/dpa. For more information
about privacy at Rapid7 please visit:
www.rapid7.com/privacy-policy.
Third-Party Penetration Test
External penetration tests are conducted on an annual Amazon Web Services (AWS) Security
basis by a third party. Rapid7 can provide letters of Competency
attestation from the external firm summarizing the
number and risk rating of findings. All findings are Rapid7 has achieved Amazon Web Services (AWS) Security
addressed in accordance with Rapid7’s formally Competency, which differentiates Rapid7 as an AWS
documented Vulnerability Handling and Disclosure Partner Network (APN) member that offers specialized
Standard Operating Procedure. To avoid potential software designed to help organizations adopt, develop
service disruptions, Rapid7 does not allow any and deploy complex security projects on AWS. To receive
customer, user, or individual to penetration test the designation, APN partners must possess deep AWS
our products or services without written consent. expertise and deliver solutions seamlessly on AWS.
Vulnerability Handling and Disclosure More information about Rapid7 compliance and security
frameworks can be found at https://www.rapid7.com/trust.
As a provider of security software, services, and research,
Rapid7 is committed to addressing security issues that are
found in our products and systems. Rapid7 has a defined
standard operating procedure for responsible handling and
disclosure of vulnerabilities that are reported. In the case
that a vulnerability is reported to us, Rapid7 will work with
the reporter to triage and fix the vulnerability in a timely
fashion. Rapid7 will also provide public acknowledgement
and attribution to any reporters who request it. Additional
information about this process can be found here:
www.rapid7.com/security/disclosure.