Looker embraces the security community and operates a responsible disclosure program to facilitate security vulnerability reporting.

Architected for Security from the Start

Looker’s data platform sits on top of your existing database, using a secure connection to query your data warehouse directly. Looker writes a query to access the data needed to answer your question, returns the result, and puts the answer in an encrypted, local disk cache that is stored for a maximum of 30 days.

Because Looker provides a single point-of-access for your data, you can establish a robust data governance infrastructure, giving everyone within your company the ability to answer their own questions, while keeping data sprawl to a minimum and access to sensitive information restricted. Administrators can set granular permissions by user or group, and can restrict data access from the database level all the way down to the row or column level.

Administrators can build robust data governance that results in a secure experience for their users.

Your Data Stays In Your Control

Looker is built to ensure that your data is safe and secure by limiting movement of data.

Leverage Your Database’s Security Protocols
Unlike other BI platforms that encourage you to pull your data out to analyze it, Looker generates SQL that directly queries your database.

Data Availability, Not Data Storage
Looker uses a read-only connection to access the minimum amount of data needed to answer your questions and only returns the relevant result set. That means less data duplication, no long-term storage of sensitive data on local machines, while leveraging the full power of your existing database security model.

Data Governance from the Bottom Up

Self-service shouldn’t come at the expense of data governance.

Secure User Access and Management
Looker makes it easy for administrators to control users’ access from the database level down to the field level.

Configuration Made Easy
Application permissions, data access, and content access can be set manually in the application, programmatically via Looker’s API, or can be inherited directly from your existing single sign-on authentication protocols.

Enterprise-Grade Feature Set

Authenticate Your Way
Looker’s platform comes standard with enterprise-grade features including two-factor authentication, SAML-based single sign-on (supporting SAML, OneLogin, and Google Apps), and team management to keep Looker access secure and up-to-date.

Industry-Standard Encryption
Looker uses industry-standard AES encryption to secure cached data stored at rest, and the TLS protocol to secure network traffic between users’ browsers and the platform.

Tools to Secure Your Database Connection
Looker offers many options for securing connections to your database, including IP Whitelisting, SSL, SSH, PKI, and Kerberos authentication.

Deployment Options for Every Customer

Different customers have different environments and different security requirements. That’s why Looker provides deployment options to fit every situation.

The Freedom to Own Your Instance
Looker can host your platform in our secure, single-tenant cloud; you can host Looker in your own Virtual Private Cloud; or you can host Looker on-premise.

Extensive Support for Database Connections
The Looker application securely connects to 34 (and counting) different SQL and SQL-on-Hadoop dialects and uses industry-standard git version control (that Looker can manage with for you, or you can manage with any Git server that can use SSH authentication).

Comprehensively monitored and fully auditable

Because Looker’s data platform provides a single point of contact for employees’ work with your enterprise’s data, it’s far easier to keep track of exactly who accessed what, when, and what they did with it.

Easily Monitor Usage and Track Development
Looker logs every interaction so administrators can audit usage and easily set up scheduled reports and alerts. And because Looker’s data model is version-controlled, you can also track when metric definitions have changed, who changed them and why.

Easy Configuration of Support Access
Looker monitors and regularly audits company support technicians’ access to your instance (and as of Looker release 4.22, you'll be able to easily turn that access on or off).

Our Shared Security Partnership

Looker connects to your organization’s database, and is designed to leave your data in that database. Because Looker connects to technology that you are responsible for maintaining, security becomes a shared responsibility between Looker and you.

Application Data Collected by Looker

While there is no permanent storage of your data in the Looker application, by default, the application passes the following information back to us to perform license validation and enhance the service. For an on-premise deployment, these can be blocked as required to meet your specific security requirements.

  • License checks - License information, including the number of users, roles, and database connections
  • Basic usage - URLs accessed, time of access, and browser type
  • Backups - Encrypted backups of the Looker instance’s database, which includes saved Looks, query history, and user settings
  • Error emails - Errors from Looker servers are generated for Engineering’s use to diagnose and improve the product (note that passwords and other private information is filtered out)
  • User admin emails - Mail generated from looker@looker.com provides new account welcome emails, forgotten password reset links, and scheduled data delivery. If preferred, you can configure these emails to use your own SMTP service instead.
  • Support tickets - Support is provided on demand via an embedded chat client service through Zendesk.

Looker’s Responsibilities

  • Cloud Security - Looker uses Amazon EC2 and other hosting providers to offer industry-standard security, availability and durability of hosted Looker implementations.
  • Product Security - Looker is responsible for ensuring that the code quality for the Looker application is developed according to industry-wide best practices for software development, and is tested for vulnerabilities regularly.
  • Corporate Security - Looker is responsible for educating and disseminating security best practices throughout its organization, and ensuring that Looker’s ancillary applications, systems, and networks are securely configured and monitored.
  • Physical Security - Looker is responsible for monitoring the Looker facilities, and ensuring that both offices and hardware are protected.

Your Responsibilities

Cloud Security
You are responsible for configuring secure access between the Looker application and your database. Looker provides extensive recommendations on how to do this, including:

  • Enabling secure database access using tools like IP whitelisting, SSL/TLS encryption, and SSH tunneling

  • Setting up the most locked-down database account permissions for Looker that still allow it to perform needed functions

Product Security
You are also responsible for controlling access and permissions for users of your Looker instance within your company. Looker recommends:

  • Setting up user authentication using either a native username/password option or, preferably, using a more robust authentication mechanism like 2FA, LDAP, Google OAuth, or SAML

  • Setting up the most restrictive user permissions and content access that still allow people to carry out their work, paying special attention to who has admin privileges

  • Setting up any API usage in a secure way

  • Regularly auditing any public access links your users create and restricting the permission to create them, as necessary

Cloud Security

Looker hosts its software on AWS Cloud Services, which means that as a Looker customer, you’ll inherit the robust standards of cloud security maintained by AWS, which Looker builds on top of for its own security best practices. Looker also uses industry best practices for the development and testing of the Looker application, ensuring that code quality meets our standards before becoming part of a Looker release.


Cloud Infrastructure

AWS facilities

The Looker application is managed on AWS Facilities which comply with over 50 security certifications, regulations, and frameworks. Physical security is managed by AWS, with facilities monitored by video surveillance, and intrusion detection systems.

Physical separation of data

The Looker application is hosted in a single-tenant environment physically separating the instances of Looker customers from each other. The Looker application is hosted in a single tenant AWS Availability Zone (AZ) environment by default. If you have specific availability needs, you can contact your Account Manager to request implementing the application in a cluster configuration.

Architecture

Looker follows AWS best practices for security architecture. Proxy servers secure access to the Looker application by providing a single point to filter attacks through IP blacklisting and connection rate limiting.

Redundancy

Looker employs a Cloud-based distributed backup framework for Looker-hosted customer servers.

Availability and durability

The Looker application can be hosted in a variety of different AWS data centers across the globe.
Monitoring & Authentication

Access to a customer’s back-end servers

Access to Looker-hosted back-end environment requires approval and multiple layers of authentication.

Access to a customer’s Looker application

Employee access to customer Looker instances is provided in order to support a customer's needs. Access requires approval and multiple layers of authentication.

Monitored user access

Access to your Looker environment is uniquely identified, logged, and monitored.

Network vulnerability scanning

Looker’s back-end is scanned for known security vulnerabilities on a regular basis.
Encryption

AES encryption

Application sensitive data stored locally including database connection configurations and cached query data is encrypted using AES encryption.

Secure credential storage & encryption

Native username and passwords are secured using a dedicated password-based key derivation function (bcrypt) with hashing and salting.

TLS encryption

Data in transit is encrypted from the user's browser to the application via TLS.

SSL / SSH encryption

Looker enables you to configure your database connection via SSL or construct an SSH tunnel.

Product Security

Overview

Code development

Code development is done through a documented SDLC process which includes guidance on how code is tested, reviewed, and promoted to production.

Peer review and unit testing of code

Code is peer reviewed before being committed to the master code branch of the Looker application. Functional and unit tests are performed using automated tools.

Routine developer training

Developers are regularly trained on secure coding practices.

Code quality tests

Looker utilizes automated tests specifically targeting injection flaws, input validation, and proper CSRF token usage.

Regular third-party penetration testing

Looker performs regular third-party penetration tests against the Looker application and hosted environment.

Single sign on

Looker provides SAML-based single sign on for users, offering support for SSO solutions from Google Apps, OneLogin, and SAML.

LDAP authentication

Looker provides the ability to authenticate users based on Lightweight Directory Access Protocol (LDAP), enabling administrators to link LDAP groups to Looker roles and permissions.

Two-Factor authentication

Looker provides the ability to use two-factor authentication via Google Authenticator.

Responsible disclosure

Looker embraces the security community and operates a responsible disclosure program to facilitate security vulnerability reporting.

Corporate Security

Looker has robust security protocols that are meant to secure the Looker Office premises and materials that contain sensitive information. Looker also invests in properly vetting and training staff to ensure that there is an organization-wide appreciation for data security.


Personnel & Third Parties

Security organization

Led by the Chief Security Officer (CSO), Looker has an established a dedicated information security function responsible for security and compliance across the organization.

Policies and procedures

Looker maintains various security policies that are maintained, communicated, and approved by management to ensure everyone clearly knows their security responsibilities.

Background checks

New contractors and employees are required to pass a background check and sign confidentiality agreements.

Security awareness education

Looker new-hires complete security training as part of the entry into the organization. Employees receive routine security awareness training and confirm adherence to Company security policies. Looker employees are reminded of security best practices through informal and formal communications.

Vendor management

Looker maintains a vendor management program to ensure that third-parties comply with an expected level of security controls.

Incident Response

Security organization

Looker’s Security and Operations team is available 24/7 to respond to security alerts and events.

Policies and procedures

Looker maintains a documented incident response plan.

Incident response training

Employees are trained on security incident response processes, including communication channels and escalation paths. Please don’t hesitate to contact your account manager, Looker’s Support chat, or email security@looker.com if you see a possible security issue.

Looker Premises and Hardware

Monitoring and secure access to looker offices

Looker offices are protected by security measures including badge access and security cameras. By policy, employees are required to escort guests inside the Looker offices.

Laptop protection

Looker uses a combination of endpoint management tools to monitor, patch, and protect its laptop population. Laptops have encrypted hard drives and are protected with sign-on password. An AV solution is also installed on laptops to protect against malware.

Compliance & Privacy

One of the priorities of Looker’s security practices is to ensure that use of your data is transparent, safe, and respectful. Looker is in the process of securing security certifications both domestically and internationally, but if you have any questions about specific requirements, email Looker’s security team at security@looker.com.

Looker’s Privacy Policy.


Security Compliance

Healthcare compliance

Looker customers include HIPAA Covered Entities and Business Associates. Since Looker doesn’t extract your data, we don’t categorize data as sensitive, personal health information or according to other schemas. Instead, we handle all data according to the same security standards. Looker will assist you to carry out HIPAA-related security obligations, which can include executing Business Associate Agreements as needed.

SOC 2 and ISO 27001 compliance

Looker is in the process of securing a SOC 2 and ISO 27001 security certification.

Privacy

EU compliance

Looker has many customers in the European Economic Area and will work with you to assure compliance with Personal Data handling requirements and cross-border transfer requirements under the EU Privacy Directive, and the new GDPR, when that comes into force in May 2018.

Determine where Looker is hosted

Looker lets you determine where your Looker is to be hosted. Currently your Looker hosted instance can reside in the US, Japan, Ireland, Australia, or Brazil. If our hosted environment does not meet your specific needs, our software can be implemented on-premises.

Love your Analytics

Business intelligence, big data analytics, or a 360 view of your customers. Whatever you need, Looker can help. Talk to our data experts.

Request a Demo