Serverless security & data protection
Unlike Hybrid deployments, Serverless deployments on Dagster+ require direct access to your data, secrets and source code.
Secrets and source code are built into the image directly. Images are stored in a per-customer container registry with restricted access. User code is securely sandboxed using modern container sandboxing techniques.
All production access is governed by industry-standard best practices which are regularly audited.
I/O management in Serverless
The default I/O manager cannot be used if you are a Serverless user who:
- Works with personally identifiable information (PII)
- Works with private health information (PHI)
- Has signed a business association agreement (BAA), or
- Are otherwise working with data subject to GDPR or other such regulations
In Serverless, code that uses the default I/O manager is automatically adjusted to save data in Dagster+ managed storage. This automatic change is useful because the Serverless filesystem is ephemeral, which means the default I/O manager wouldn't work as expected.
However, this automatic change also means potentially sensitive data could be stored and not just processed or orchestrated by Dagster+.
To prevent this, you can use another I/O manager that stores data in your infrastructure or adapt your code to avoid using an I/O manager.
You must have boto3 or dagster-cloud[serverless]
installed as a project dependency otherwise the Dagster+ managed storage can fail and silently fall back to using the default I/O manager.
Adding environment variables and secrets
Often you'll need to securely access secrets from your jobs. Dagster+ supports several methods for adding secrets—refer to the Dagster+ environment variables documentation for more information.