Check out the Dagster+ Summer Update for exciting new features and to sign up for the beta.
  • Product

    Product Overview

    Data Orchestration

    Data Catalog

    Data Quality

    Cost Insights

    Components

    Integrations

    Enterprise

  • Solutions
    Industries

    Finance

    Software & Technology

    Retail & E-commerce

    Life Sciences

    Sign up
    Workflows

    ETL/ELT Pipelines

    AI & Machine Learning

    Data Modernization

    Data Products

    Support
  • Pricing
  • Company

    About us

    Careers

    Partners

    Brand Kit

  • Resources
    Resources

    All Resources

    Blog

    Events

    Docs

    Customer Stories

    Community

    University

    GitHub

    How we Compare

    Dagster vs Airflow

    Dagster vs Prefect

    Dagster vs dbt Cloud

    Dagster vs Azure Data Factory

    Dagster vs AWS Step Functions

    Featured resources
    Forrester TEI Report
    Discover how Dagster drives ROI and engineering efficiency. Read the Forrester TEI report for data-backed insights on impact and cost savings.
    Read Blog
    Data Fundamentals eBook
    Download Dagster’s free eBook to learn how to design and scale a modern data platform - from tools and architecture to best practices and workflows.
    Read Blog
Try Dagster+
Sign In

Dagster: General security

Dagster Labs is the corporate sponsor of Dagster, an open-source data infrastructure project that lets customers develop, run, and monitor data pipelines. Dagster Labs also runs Dagster+, a hosted SaaS product built on top of Dagster. Dagster Labs designs its processes procedures related to its platform to meet its objectives for its data orchestration products and services.

Data

While Dagster pipelines process customer data, its hybrid architecture ensures that both the code that customers write to run pipelines, as well as the customer data upon which those pipelines operate, stay fully within the customer’s environment and are never stored or accessed by Dagster+ hosted services. Dagster+ stores the following types of data:

  • Customer Metadata: Metadata about the pipelines that run in Dagster+.
  • Log Data: Logs, traces, and samples produced by Dagster+ while running pipelines.

Customer Metadata is treated as sensitive by Dagster Labs. It is stored persistently, so that users can view information about past runs and understand the current state of their Dagster+ deployments . Dagster Labs employees may access metadata to troubleshoot customer issues or to gather feedback for improving the Dagster+ product.

Log Data is produced by Dagster+ system components to make it easier for Dagster Labs operators to monitor the health of the system and track down any issues. Log data is a trace of the actions performed by the system when serving web and API requests, backend services scheduling, launching, and monitoring jobs. Log data will include snapshots of Customer Metadata when the logs were captured, so that operators can understand the state of the system when the logs were produced. Log data also includes stack traces and samples of running code, as well as stack traces of errors that the agent encountered. Log data will only include the Customer Metadata listed above - since Dagster+ does not process customer data, customer data will not appear in logs.

Encryption

All inbound network requests to Dagster+ require HTTPS, and all data stored persistently in our Postgres Database, Redis Message Queue, and S3 buckets are encrypted at rest.

Risk Management and Security Controls

Dagster Labs maintains a Risk Management Policy with the goal of assessing and managing Dagster Labs’s information security risks in order to achieve the company’s business and information security objectives. As part of this process, Dagster Labs maintains a risk register to track all systems and procedures that could present risks to meeting the company’s objectives. The risk register is reevaluated annually, and tasks are incorporated into the regular Dagster Labs product development process so they can be dealt with predictably and iteratively.

Risks are assessed and ranked according to their impact and their likelihood of occurrence. A formal IT risk assessment, network penetration tests, and Dagster+ penetration test are performed at least annually.

Incident Response Management

Dagster Labs maintains an Incident Response Policy that gives any Dagster Labs employee the ability to initiate a response to a potential security incident by notifying the internal security team through several channels and assists in classifying the severity of the incident.

Dagster Labs’s management conducts quality assurance monitoring on a regular basis and additional training is provided based upon results of monitoring procedures. Management’s close involvement in Dagster Labs’s operations helps to identify significant variances from expectations regarding internal controls. Upper management evaluates the facts and circumstances related to any suspected control breakdown. A decision for addressing any control’s weakness is made based on whether the incident was isolated or requires a change in the company’s procedures or personnel.

Physical Security

All Dagster+ data is hosted by Amazon Web Services (AWS). AWS data centers do not allow Dagster Labs employees physical access.

Dagster Labs’s physical office locations do not have access to operational or developmental environments, and do not house any customer information.

{{compliance-component}}

Customer Responsibilities

Dagster Labs’s services are designed with the assumption that certain controls will be implemented by user entities. Such controls are called complementary user entity controls.

The following complementary user entity controls should be implemented by user entities to provide additional assurance that the Trust Services Criteria described within this report are met. As these items represent only a part of the control considerations that might be pertinent at the user entities’ locations, user entities’ auditors should exercise judgment in selecting and reviewing these complementary user entity controls.

Dagster+ hybrid architecture ensures that all customer data stays in the customer’s cloud.

  • User entities are responsible for understanding and complying with their contractual obligations to Dagster Labs.
  • User entities are responsible for ensuring that the access control levels that they set in Dagster Labs tools match the desired access control level for use of Dagster+.
  • User entities are responsible for notifying Dagster Labs of changes made to technical or administrative contact information.
  • User entities are responsible for ensuring the supervision, management, and control of the use of Dagster Labs services by their personnel.
  • User entities are responsible for developing their own disaster recovery and business continuity plans that address the inability to access or utilize Dagster Labs services.
  • User entities are responsible for immediately notifying Dagster Labs of any actual or suspected information security breaches, including compromised user accounts.

Found a bug or issue? Have questions or concerns? Contact us at security@dagsterlabs.com.

Compliance

SOC 2 Type 2:

Our SOC 2 Type II report proves our commitment to security as we aim to keep our customer data secure.

HIPAA:

In order to handle the most sensitive types of customer information, Dagster Labs (the company behind Dagster) is HIPAA compliant to secure Protected Health Information.

Platform
  • Data Orchestration
  • Data Catalog
  • Data Quality
  • Cost Insights
  • Integrations
  • Dagster EnterpriseComponents
Solutions
  • Finance
  • Software & Technology
  • Retail & E-commerce
  • Life Sciences
  • ETL/ELT Pipelines
  • AI & Machine Learning
  • Data Modernization
  • Real-Time Data Monitoring
Resources
  • All Resources
  • Customer Stories
  • Dagster University
  • Tutorials & Guides
  • Community
  • Glossary
  • Events
  • Blog
Company
  • About us
  • Careers
  • Partners
  • SupportStatus
  • Brand Kit
  • Contact
Copyright © 2025 Elementl, Inc. d.b.a. Dagster Labs. All rights reserved.
X icon
LinkedIn icon
YouTube icon
Stack Overflow icon
Privacy Policy
Terms of Service
Security
EULA
PPA
Cookie Preferences