CloudBlue Cloud Marketplace Guide 2025 | Download Now

Cloud Marketplace Guide | Download Now

FAQ

Have more questions? Need answers? Review the below article we’ve created for more information on privacy and security frequently asked questions.

Data Lake FAQ

Introduction

As part of our ongoing commitment to deliver high-value services and offerings to our customers, CloudBlue has created an advanced data processing infrastructure, known as the CloudBlue Data Lake. This infrastructure enhancement is designed to support further the services CloudBlue provides to its customers. The CloudBlue Data Lake is intended to facilitate and enhance the provision of comprehensive data analysis, support reconciliation processes, and the delivery of sophisticated reporting and analytics services across its global operations. CloudBlue provides a sub processor change notification to affected partners and is providing this FAQ, so our customers are fully aware and informed about the steps CloudBlue has taken to secure data you have entrusted to us. We are committed to privacy and data protection. CloudBlue is a fully owned subsidiary of Ingram Micro Inc. Any references to Ingram Micro herein should be understood to include CloudBlue.

Due Diligence

Ingram Micro has an established, extensive vendor review and onboarding process. Our Information Security, Legal, Privacy, and Compliance teams conduct due diligence reviews for each vendor, based on industry standards, some of which include:
  • the type of data being hosted or shared.
  • the confidentiality and sensitivity of the data.
  • the vendor’s privacy and data handling practices.
  • the vendor’s incident management and business continuity practices.
The GCP went through this process. In addition to the publicly available contracts on GCP’s website, GCP and Ingram Micro Inc. entered into a separate contractual agreement that covers what we perceived were gaps to ensure your data is handled appropriately.

Impact

The change will be transparent to customer who use CloudBlue services. We are duplicating certain backend data from CloudBlue offerings which your company is using into CloudBlue Data Lake on GCP. None of the functionality or services you currently use will be affected.

Privacy Principles

  1. Data Protection Agreements (DPA) – CloudBlue has data processing agreements in place with its customers, and we have agreed to Google’s DPA for the sub-processing activities.
  2. Auditing & Monitoring – Ingram Micro has verified these claims through various technical controls, including Approved Access – which means Google administrators cannot access Ingram Micro’s tenant without our approval. In addition, Access Transparency Logs let Ingram Micro know whenever a GCP administrator accesses our tenant configuration or any of the data in GCP. GCP provides robust monitoring and audited tools that ensure our data is protected. A link to the document Trusting Your Data with Google Cloud, provides insight into GCP’s operational policies and procedures, and can be found in the Additional Resources section.
  3. GCP Privacy Practices – GCP has published numerous documents on its privacy practices, we have summarized the important content below:
  • Customer’s control their data. The data stored in GCP does not belong to GCP, but the user. They are the custodians of the data and process it according to contractual agreements.
  • Data stored in GCP is never used for advertising.
  • GCP is transparent about data collection and use. All processing complies with government regulations and privacy best practices.
  • GCP never sells customer or service data.
  • Security and privacy are inherent design criteria for GCP, which cascades to customer environments that use these services.

Compliance

Ingram Micro complies with global data security and privacy standards and requires suppliers such as GCP to adhere to these as part of the services they provide to Ingram Micro. GCP maintains a wide range of compliance certifications, including:

  • SOC 1
  • SOC 2
  • SOC 3
  • ISO 27001
  • ISO 27017
  • ISO 27018
  • HIPAA
  • PCI DSS
GCP also complies with regional privacy and regulatory standards around the world, such as:
  • CCPA
  • PIPEDA
  • GDPR
The GCP is a voluntary participant in the EU Cloud Code of Conduct to demonstrate their commitment to accountability, compliance support, and data protection principles. Data from on the CloudBlue Data Lake will be hosted within GCP data centers in the United Kingdom.

Encryption

The GCP has encryption at rest enabled by default. It uses the industry standard AES-256 encryption algorithm in conjunction with the Tink cryptograph library for FIPS 140-2 validation. All GCP data centers, regardless of location, follow the same privacy principles, compliance controls, and operating standards.

Development and Maintenance

Our applications and data running on the Google Cloud environment were developed by CloudBlue using our Software Development Life Cycle (SDLC), which follows the Software Assurance Maturity Model (SAMM) methodology and Center for Internet Security (CIS) benchmarks. Security assurance activities such as penetration testing, code review, and architecture analysis are an integral part of the development effort. The same process is used when new features and enhancements are added.

Common Questions

Q1: Will Google or GCP be able to access the data in the CloudBlue platforms for example number of subscriptions, prices, invoices etc.?

A1: No. Google personnel does not have access to the data in the CloudBlue data lake on GCP. We are not replicating personal data of end-customers.

Q2: Do customers or partners need to make any changes to their internal processes?

A2: CloudBlue is duplicating data from one platform (Azure) to another (GCP). You will not need to make any changes to your internal processes at this time. You will still use the already-existing web applications.

Q3: Where will the data be hosted?

A3: CloudBlue will store data in the CloudBlue Data Lake in GCP in the United Kingdom.

Q4: Is order history or any other information being sold to Google?

A4: No. CloudBlue is not selling any information to Google. CloudBlue has implemented technical compliance controls and measures to monitor its data to detect unauthorized access.

Q5: Is Google being given any personal information, such as customer names and addresses?

A5: Neither Google nor GCP have access to the data stored in GCP. Information stored within GCP is not accessible to or shared with other Alphabet, Inc. entities, such as Google’s other business units.

Q6: Can CloudBlue be more specific about information being shared with Google and for what purpose?

A6: CloudBlue is not sharing information with Google. GCP is an Infrastructure-as-a-Service provider and CloudBlue is using that infrastructure to store data for CloudBlue Data Lake. The environment used in GCP is administered by Ingram Micro, not Google.

Additional Resources

Google has published a number of documents regarding GCP that were used by Ingram Micro, both during our due diligence activities as well as in the creation of this FAQ. Links to each along with a brief description can be found below:

Cyber Security and Privacy FAQ

Have more questions? Need answers? Review the below article we’ve created for more information on privacy and security frequently asked questions.

1. What is GDPR?

Answer: The General Data Protection Regulation (GDPR) is a European privacy law that became enforceable on May 25, 2018. The GDPR replaced the EU Data Protection Directive, also known as Directive 95/46/EC, and intended to harmonize data protection laws throughout the European Union (EU) by applying a single data protection law that is binding throughout each member state.

2. What is personal data?

Answer: Personal data is any information relating to an identified or identifiable natural person, such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity of that natural person. Note: under some local legislations the definition of personal data could cover other types of information and “personal data” is not equal to “customer data”. Customer data is a broader notion that typically includes transactional data and any other data processed through Ingram Micro’s products.

3. Are cookies considered personal data and are they subject to the requirements of GDPR?

Answer: Cookies can be considered personal data. The GDPR explicitly states that online identifiers, even if they are pseudonymized or if they do not directly identify an individual, will be considered personal data if there is potential for an individual to be identified or singled out. In addition, cookies can also be regulated by other European or local laws and regulations. For more information visit our Cookie Policy.

4. What is a data subject?

Answer: Data subject is any identified or identifiable natural person. An identifiable natural person is one who can be identified, directly or indirectly, by reference to any personal data. Note: under some local legislations the definition of data subject could cover legal persons as well.

5. What is considered processing of personal data?

Answer: Processing means any operation or set of operations which is performed on personal data or on sets of personal data, whether by automated means, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.

6. What is considered personal data transfer?

Answer: Data transfer is the act of transferring any personal data from one location to another through some communication method. Note: under some legal frameworks, the simple access to personal data hosted on a server in one location such as within the territory of the European Economic Area, from another location for example outside the European Economic Area can be considered a data transfer. Personal data transfer may be subject to specific legal requirements depending on the jurisdiction.

7. Can we transfer data from the European Union to other locations and to which locations?

Answer: Transfers of personal data from the European Union to a location outside the European Economic Area are allowed under the European legal framework if the specific legal conditions for such transfers are complied with.

8. What is a Data Processing Agreement (DPA)?

Answer: A data processing agreement (DPA) is a legally binding document to be entered into between the controller and the processor or between the processor and its sub-processor. It regulates the scope of the data processing – such as the purpose, types of data, types of data subjects etc. – as well as the relationship between the controller and the processor and their rights and obligation with regards to the processing of personal data. Essentially, a DPA is a form of assurance that the processor or sub-processor performs their obligations and shall ensure the protection of personal data. In some jurisdictions the execution of a DPA between controllers and their processor or between the processor and its sub-processors, is a legal requirement. We offer a GDPR-compliant and industry standard Data Processing Agreement.

9. Who owns the personal data processed using Ingram Micro services?

Answer: As a customer, you maintain ownership of the personal data you upload into Ingram Micro products. Therefore, you select what personal data can be processed, stored, and hosted through Ingram Micro products. We do not access or use your personal data for any purpose other than what is agreed upon with you in advance, except in each case as necessary to comply with the applicable laws or a binding order of a governmental body.

10. Who controls personal data?

Answer: As a customer, you control your data. We offer industry standard security features to protect and encrypt your data in transit and at rest which are appropriate to the risks presented by the processing of your data, taking into account the state of the art, the costs of implementation, the nature, scope, context and purposes of the processing of your data, the nature of the data as well as the risk and severity for the rights and freedoms of natural persons. You manage your data and the access to your data, and access to Ingram Micro services and resources through identity and access policy based on users, groups, permissions, and credentials that you control.

11. Where is my data stored?

Answer: Ingram Micro data is stored in our Ingram Micro Data Centre and/or through a Cloud Service Provider infrastructure with highly reliable servers that guarantee optimal uptime, and data security for all our customers and data (including order, asset, and tiers information within the platform).

12. I am an Ingram Micro Cloud customer. What is the role of the customer in securing their data in the Cloud?

Answer: When evaluating the security of a cloud solution, it is important for you to understand and distinguish between the security of the cloud, and your security in the cloud. Security of the cloud encompasses the security measures that Ingram Micro implements and operates. Ingram Micro is responsible for security of the cloud. Security in the cloud encompasses the security measures that you, as a data controller, implement and operate, related to the Ingram Micro products you use. You are responsible for your security in the cloud and responsible for receiving awareness education and training with regular updates as relevant for your business role.

13. I am an Ingram Micro Cloud customer. What is a shared responsibility model?

Answer: Security and data protection compliance is a shared responsibility between Ingram Micro and each customer. The shared responsibility model is a useful approach to illustrate the different responsibilities of Ingram Micro (as a data processor or sub-processor) and customers (as either data controllers or data processors) under the applicable data protection laws. Under the shared responsibility model, for example, Ingram Micro is responsible for the security of the cloud, while the customer is responsible for security in the cloud. Shared model configuration depends on the Ingram Micro cloud services that customers elect to use and how those services are integrated into customers’ IT environments. Depending on this configuration, the responsibility of the provider (processor or sub-processor) or the customer (controller), may vary.

14. What steps does Ingram Micro take to protect personal data?

Answer: At Ingram Micro, our highest priority is securing our customers’ data, and we implement rigorous contractual, technical, and organizational measures to protect the confidentiality, integrity, and availability of the information regardless of the region where the customer is located and the origin of the data. More information on the specific contractual, technical, and organizational measures implemented by Ingram Micro is available at Cyber Security Program Overview.

15. What if there is a security breach?

Answer: Ingram Micro has a security incident monitoring and data breach notification process in place and will notify customers of breaches of Ingram Micro’s security shield without undue delay and in accordance with the Ingram Micro DPA or in accordance with applicable laws and regulations.

16. Who should I contact if I have any questions about data protection, security, or privacy?

Answer: We recommend customers with questions regarding Ingram Micro’s data protection and security practices contact their account manager or submit a request via Contact Us.

17. Do you have a formal and documented security program that undergoes continuous improvement?

Answer: Ingram Micro has an Information Security Policy which describes all the security programs maintained across the organization. The information security policy shall be reviewed by the CISO on an annual basis. Ingram Micro has adopted the NIST Cybersecurity Framework (CSF) as our official cybersecurity framework. More information can be found via our Cyber Security Program Overview.

18. Are information security roles and responsibilities clearly defined and communicated to the employees?

Answer: Ingram Micro has clearly defined roles and responsibilities related to cybersecurity and privacy. The information security policies shall be communicated to all associates on an annual basis as part of mandatory annual training.

19. Is security awareness training provided to employees of Ingram Micro?

Answer: All users shall participate in annual information security, privacy, compliance, and awareness training and complete such training by the deadline established by the CISO. Specialized training for developers is offered annually to developers.

20. List all the Compliance programs implemented by Ingram Micro.

Answer: Ingram Micro implements controls to comply with the following compliance programs: Payment Card Industry (PCI) Data Security Standard (DSS), Sarbanes Oxley Act (SOX), ISO 27001:2013. For more information visit Compliance, Regulations, Standards and Certifications.

21. Does Ingram Micro have a Privacy program?

Answer: Ingram Micro stores personal data only in approved company applications. Personal Data should only be collected and processed for lawful and legitimate business purposes. Sharing personal data with third parties requires CISO approval. For more information visit our Ingram Micro Global Data Protection and Privacy Program Overview and/or Privacy Statement.

22. Does Ingram Micro have a formal data classification which documents data access, labelling, and disposal requirements?

Answer: Company information should be classified correctly, protected, and securely distributed. We mark documents with their data classification: Highly Confidential, Confidential, and Public. We protect information based on its classification. We retain data based on our records retention schedule. Users must comply with Payment Card Industry (“PCI”) standards for processing, storing, and transmitting credit card data.

23. Does Ingram Micro use a Password Management system?

Answer: Ingram Micro does have a password management system. Requirements for passwords are defined and enforced across the organization. Users are prohibited from sharing their password with others. Remote access requires multifactor authentication.

24. Does Ingram Micro have an incident response plan? Please describe.

Answer: Ingram Micro has an established process for security incident response and a trained team. Response and recovery plans for incidents and disasters is established, managed, and tested. The incident response plan includes an investigation task to determine root cause and, where possible, attribution. Communication protocols have been established and are embedded in the incident response plan. See What if there is a Security Breach.

25. Do you have a vulnerability management system?

Answer: All the assets are scanned for vulnerabilities monthly. Vulnerabilities are remediated based on internal and industry standards.

26. Is there an acceptable use policy for information and associated assets?

Answer: We define acceptable uses of our data and assets. Associates are not to use company assets or time to access or distribute offensive material. Company assets should be protected from theft. All associates are responsible for ensuring that IM assets and non-public IM information are not left unprotected when they are not in use at personal and public workspaces. Theft or loss of company assets must be reported and investigated. All users must comply with laws, regulations, and compliance programs regarding the use of data, network, and computer systems.

27. Do you have an access control policy?

Answer: Associates should have the least privileges necessary to perform their job function. When approved associates (or contract personnel) may be provided with access (including, when appropriate, administrative access) to Ingram Micro asset for the purposes of complying with our policies, to support their duties and responsibilities, or to perform an audit.

28. Do you periodically review access to information assets?

Answer: We periodically review access to ensure associates have the appropriate level of access for their position and responsibilities We disable/delete access or IDs when they are no longer needed. Assets (physical devices, software, software-as-a-service, cloud infrastructure, internally developed applications, and tools, etc.) must be inventoried and kept up to date. Company Assets (including Company networks) are provided for business use. We define acceptable uses of our data and assets.

29. Is there a process to review and/or monitor information security incidents or events?

Answer: Users of Ingram Micro technology services are subject to monitoring on any Ingram Micro asset, system, or network where allowed by law. The information security department centrally collects and analyzes logs for anomalous behavior (security event). Security events are analyzed, correlated (from multiple sources), and potential impacts determined. The Security Operations Center (SOC) is responsible for leveraging the anomalies, events, and security continuous monitoring to detect and react to threats.

Subscribe and stay updated
on the latest at CloudBlue.

By providing my Personal Data to CloudBlue and its affiliates, I agree to be contacted for marketing purposes and I acknowledge and agree to the collection and processing of my Personal Data in accordance with the Privacy Statement.

Let's talk