Alta Labs’ cloud-based management platform is included with the purchase of Alta Labs products at no additional cost. It powers thousands of devices from small home and office configurations to large-scale enterprise installs. Our customers deserve peace of mind regarding the security of their networks and the policies and infrastructure in place to ensure that security carries into managing network policy.
Alta Labs does not route any customer network traffic processed by Alta Labs Wireless Access Points, Network Switches, Routers, Gateways, etc. through its cloud infrastructure. Only customer network configuration information is stored in our cloud management platform. Configuration information is not stored in our cloud for the Control hardware or self-hosted software. Alta Labs devices do not need consistent access to our management platform to operate properly. They only require access when a site administrator or user wants to change network policy, view the network status, or run utilization reports.
Alta Labs does not store any configuration data in the cloud for the self-hosted version of Control.
Our security efforts are led by our top-level team of Alta Labs employees, including our CEO Chase Harrison, CTO Jeff Hansen, and Principal Architect Chris Buechler.
Infrastructure Security
The Alta Labs Control management platform can be accessed via our cloud portal at manage.alta.inc, via our Control network controller hardware solution, or our downloadable self-hosted local controller software.
Icon
Topic
Topics that only apply to our Cloud Portal will have a Cloud icon
Topics that only apply to our local controller will have a Control icon
Topics that an independent security contractor periodically audits have the Audited/Check icon
Cloud Portal Providers
The Alta Labs cloud management platform is deployed with AWS (Amazon Web Services) to provide our customers with highly secure, scalable, redundant, and globally accessible network configuration. Cloud Services are implemented following the:
AWS Shared Responsibility Model
Network Architecture
Alta Labs Cloud Portal is contained within AWS Virtual Private Clouds (VPCs), restricting public access to critical internal services. Services are implemented using
AWS Best Practices
and distributed across multiple availability zones for redundancy.
All user traffic handled by Alta Labs access points and switches is bridged within the Local Area Network that it originated from. In the case of a user-configured IP tunnel, user traffic is only routed to/from the user’s configured tunnels.
Alta Labs does not monitor user traffic.
All user traffic handled by an Alta Labs Router is routed within the user’s connected networks and is not monitored by Alta Labs.
Network Security
The Alta Labs management platform is designed to restrict all management traffic (including portal authentication/management and network configuration) to a minimum TLS 1.2 protocol level with high-grade asymmetric and symmetric encryption, always using a publicly verifiable SSL certificate. Self-signed certificates are not used or supported under normal circumstances.
Production Environment Access
Within Alta Labs, access to production environment configuration and deployment is reserved on a need-to-know basis. Those with access require significant tenure within the company and must pass background checks.
Databases
All data within Alta Labs management platform databases is encrypted at rest. See the Encryption data section.
Amazon RDS (Amazon Relational Database Service) is deployed to automate tasks such as provisioning, configuring, backing up, and patching. Data is protected with encryption whether at rest or in transit. Databases are encrypted using keys managed through AWS Key Management Service (AWS KMS). Alta Labs is utilizing this architecture as it is well known and has a track record of reliability and security.
Data Backup
Data is stored, encrypted at rest, and protected in an ISO-27001-compliant data center. Data is partitioned in the database in such a way that one customer cannot access another customer's data without an explicit invite. The invite has to come from the customer who runs the site. Logs are also encrypted at rest and deleted after 90 days.
Encryption
Data in transit
Everything in the cloud
Site Authentication
Network Configuration
Type
Minimum TLS 1.2 or higher, based on negotiation (can be audited)
Data in transit encryption is military-grade
Data at rest
Everything in the cloud
Databases
Backups
Type
Maintained by AWS, an encrypted file system that encrypts all of your data and metadata at rest using an industry-standard AES-256 encryption algorithm. This file system is designed to automatically deal with encryption and decryption transparently. (As described in the Database section above, Amazon RDS is utilized and databases are encrypted using keys managed through AWS Key Management Service (AWS KMS). Alta Labs does not have the encryption keys.
Data at rest encryption is HIPAA-compliant
What's not encrypted
Configs stored locally on APs and switches
Tenant Separation
Amazon Cognito ensures customer identity and access management with flexible sign-up and sign-in. Scalable to millions of users and hundreds of transactions per second, Amazon Cognito is used in conjunction with SRP (Secure Remote Password) for authentication.
MFA (Multi-Factor Authentication) can also be employed for an extra layer of protection. App-based authentication using an Authenticator App can be set up or SMS-based authentication with verification done via text/SMS.
There is logical separation based on authentication tokens. The Alta Labs environment is a multi-tenant environment with logical separation between users. Customer data is segregated at the application level using unique IDs combined from several parameters.
The Alta Labs management platform is designed to restrict all management traffic (including portal authentication/management and network configuration) to a minimum TLS 1.2 protocol level with high-grade asymmetric and symmetric encryption, always using a publicly verifiable SSL certificate. Self-signed certificates are not used or supported under normal circumstances.
SLA (Service Level Agreement)
99.99% Uptime for our cloud-based management platform. The platform is monitored 24 hours a day, 7 days a week. Engineers are notified immediately upon any service interruption.
Security Features and Functionality
How Alta Labs Requires Users to Log In to Platform
Alta Labs requires all users to log in to the management platform. Simply sign in with an email address and password or use a Google or Apple SSO. App-based or SMS-based multi-factor authentication can be enabled for additional security. SSH is available for local device control, but is protected via SSH key authentication. SSH password authentication is not supported for increased security.
Permissions Within a Site
Notifications
Disconnections: Network device notifications
Access Requests: Network access requests
Permissions
Administrator: Allows modification of most site settings.
All Password Access: Allows read/write access to all passwords as an administrator. Allows read access to all WiFi passwords as a non-administrator.
Unlocked Password Access: Allows read/write access to unlocked WiFi passwords, even as a non-administrator.
API
Shared with trusted partners
All requests are protected using signed, timestamped JWT tokens
Application Security
Discrete services.
Cloud services are compartmentalized into discreet, purpose-built systems. Each system is only authorized to perform the task for which it was built, and logs are monitored to ensure that focus is maintained.
Privilege separation: Unprivileged users.
To prevent unauthorized privilege escalation, controller, database, and other services operate using non-administrator accounts.
Operational Security
Customer Data: Alta Labs does not have access to customer data. Alta Labs team members can only see and make changes to a site if a customer invites them to do so via Settings > Users > Invite a user.
The Alta Labs team (technical support, sales, training, etc.) can only access sites they have been invited to by the site administrator. This is a global and company-wide policy. Employees cannot browse or access a list of global sites.
When invited by a site administrator and given administrator access, Alta Labs team members have the same access as the original site administrator.
Alta Labs as a company does not maintain or control any sites that we have not been explicitly invited to unless asked to do so by the site administrator. However, Alta Labs does work to maintain the physical, virtual, and network infrastructure that houses the controller and the sites that leverage that technology. This includes assuring security standards and protocols are being met and exceeded, along with the target uptime service level agreement.
Alta Labs team members can only see a list of users who have created accounts within the Alta Labs forum. The Alta Labs team cannot see a list of users you have invited to a particular site unless you have invited a member of our team to help manage that site as a fellow administrator.
Data Retention: AP's, switches, and routers store configuration data, as well as historical traffic and connected client statistics.
Facility Access: Alta Labs facilities are located in Hurricane, Utah, and are only accessible by employees who are active and in good standing.
Cloud Security: AWS Cloud Security is known for having the most secure global cloud infrastructure. Millions of customers, including the most security-sensitive organizations like government, healthcare, and financial services utilize AWS Security.
Alta Labs Firmware and UI Update Release Strategy
At Alta Labs, our commitment is to elevate your network by providing secure, high-performance, and feature-rich networking solutions. Our user interace, firmware development, and release strategy is built around this mission, ensuring that every update delivers value, reliability, and stability to your network.
Auto-update is enabled by default on all new sites, and free updates are included with all Alta Labs products for the lifetime of the device(s). We recommend leaving this enabled, as it allows all Alta Labs users to benefit from the latest features, incremental improvements, and bug-fixes as our development team identifies and implements them. Even though auto-update is optional, our release track record has allowed us to maintain that 98% of all sites and 95% of all devices remain configured on auto-update, by user’s choice.
Continuous Innovation, Thoroughly Tested
We believe in rapid innovation—without compromising on quality. New features and updates are deployed frequently to our internal test sites where they undergo extensive vetting. These sites vary widely in size, complexity and geolocation. These deployments ensure that each firmware version meets our rigorous burn-in and quality assurance standards before it reaches your devices.
This process can result in one to multiple production firmware releases within a single week. This cadence allows us to stay ahead of emerging threats, respond quickly to user feedback, and consistently improve your network experience.
Transparent Communication
Once a firmware version passes internal validation, we will adhere to the following documentation schedule:
Firmware Release Notes are posted on our Community Forum at the time of public release of the firmware, detailing new features, enhancements, and fixes.
Documentation for complex or notable features will be targeted for completion to be added to our Knowledge Base within 30 days of the public release.
YouTube Videos providing a walkthrough of the firmware release, or specific feature included therein, may also be produced and be made available within 30 days of the firmware release.
Stability and Security First
In rare cases where immediate action is needed to resolve a critical security issue or stabilize the platform, we may release firmware ahead of finalized release notes. This ensures your network remains protected and performant under all circumstances. It also gives users time to validate new releases before rolling it out more widely.
Alta Labs Support Overview
Alta Labs is proud to provide top tier, free technical support available via the following methods:
If using the Contact Us, Email, Phone, or Online chat methods, please only use one initial method so that we may create a unique case number to track your support needs.
When to Contact Technical Support
Suspected Hardware Failure
It is critical that technical support troubleshoot with you if you suspect that there is a hardware failure. The ticket number you will receive is a requirement to obtain an RMA. If you do not have a ticket number accompanying an RMA, there is a chance your RMA claim may be denied.
Suspected Bugs
If you believe you’ve found a bug with one of our products or services, please use one of the aforementioned communication methods to report it so we can attempt to reproduce the issue and report it to the development team.
How To
If you have a question about how to obtain a particular outcome that is not design related nor covered in our Help Center linked above.
Help Center Article Recommendations.
If you believe there is a gap in the Help Center, please feel free to recommend an article. The Support Team writes the articles, so you’ll be recommending an article directly to the people who will be authoring the article.
FAQ: Contacting the Appropriate Department
Who do I contact with a non-technical or pre-sales question?
If you are inquiring about a product that you do not yet own, it is most likely a presales question and would be best served by our sales team. They can be reached at sales@alta.inc or by phone at 866-592-3777 (Mon-Fri, 8am-5pm, Mountain Time). If the query is too technical for our sales staff to answer, they will collaborate with the Alta Labs technical support team to provide the best answer.
Who Do I Contact for Feature Requests?
Share your request on the Feature Requests section of our community for best results. Alta Labs is very community driven and submitting your request to the community allows others to vote on the request.
How Can I Check on My RMA Status?
Send an email to rma@alta.inc. When doing so, please make sure you reference your RMA number. If you have not yet received an RMA number, please reference your ticket number.
Can You Help Me Design My Network?
Our Support Team is provided to help troubleshoot any issues you may encounter setting up or using our products. If you’d like assistance designing a network, we recommend that you contact a network installation professional. Installers and distributors in your area can be found from our Where to Buy page. If you have any trouble locating a network professional, feel free to reach out to our Sales team at sales@alta.inc and we will do our best to help you track one down.
How We Can Best Help You
As noted in the section above, “When to Contact Technical Support”, our primary purpose is to help provide assistance troubleshooting any product that you are installing or having issues with. Our team is also happy to provide configuration advice, limited configuration assistance via verbal or written instruction or access to your site(s) to demonstrate and/or provide training within the narrow scope of the objective to our customers on a particular path to a desired configuration.
When contacting Alta Labs via phone or chat, we strongly recommend providing an email address that you check frequently so we may follow up easily if necessary. We do not send SPAM; your email address will be kept secure.
Alta Labs Support Staff will help troubleshoot any bugs or suspected bugs with firmware, the cloud-based controller, or the local controller on a Control appliance. If a bug is reproducible, we will log it and queue it to be fixed.
Limited Support
Alta Labs Support Team will support Alta Labs equipment to a point that the representative deems that the Alta device and/or Alta configuration is correct and/or that the issue is upstream from the Alta device(s) or if the issue is caused by a downstream device or devices. This determination will solely be based on comparable systems with a reasonably similar configuration that are functioning as intended. Should that be the case, the representative will inform you as such and may, at their discretion, provide a general overview of the steps needed on any upstream device(s) to achieve the desired configuration. Alta Labs makes no guarantee of 100% accuracy of terminology or advice for equipment outside of the Alta Labs ecosystem. If you need further assistance, we welcome you to post your inquiry in our Community Forum and provide other customers with the opportunity to assist with any third-party configuration questions. Should your case involve third party hardware, we recommend also reaching out to that vendor’s support program.
Alta Labs will provide support via the online community only for the following technologies and products:
CLI operations and/or configurations
Stable releases of the local controller
Pre-release feature, Beta, or Release Candidate releases, as applicable
What Alta Labs Does Not Support
Any scenarios that are not specifically detailed in this overview may not be supported
If the product housing has been opened, the warranty is void per our warranty policy
Third party hardware setup and/or configuration
Third party software setup and/or configuration
Conference calls with third party vendors, manufacturers, or providers
RF Channel Planning or any issues that arise from the lack of proper RF Channel Planning
Insufficient coverage due to lack of appropriate hardware
Full network and/or WiFi setup from start to finish. In other words, it is the customer's responsibility to attempt initial setup using the provided documentation, and reach out to support only if problems arise. This will help us better serve those with actual installation or performance issues.
SSID/PSK recovery
Account recovery
Alta Labs employees generally will not make use of remote control software, such as TeamViewer or AnyDesk, to access any systems for troubleshooting or diagnostics. However, it is a common request for Alta Labs engineering teams to be invited to the site showing symptoms.
Abuse of support platforms*
Abuse of support team members**
* - Abuse of support platforms includes but is not limited to:
Repeated and frequent requests of the same topic, subject, scenario, etc. despite having been instructed on the steps to produce the desired outcome.
Refusal to follow advised procedures or steps
Attempt to obtain free hardware or upgraded hardware
Sending multiple inquiries regardless of the method, if you don’t receive an immediate response. We address inquiries as quickly as possible and on a FIFO (first in, first out) basis. We will respond as soon as we can. The following exceptions to this policy apply:
If the inquirer is on a customer’s site, we understand that is a time sensitive scenario. In this case, please use one alternative communication method. For example, if you call and don’t get through to a technician, feel free to email us, inform us that you just called, and that it’s a time sensitive situation. We will reach back out to you as soon as a representative is available
If you have not received a response within 1 hour during our business hours outlined above and the issue is time sensitive, please feel free to contact us again. This circumstance is extremely rare but is possible
** - Abuse of support team members is contextual and does not have a hard definition. A tech support engineer will notify the Director of Customer Solutions for Alta Labs or other leadership of the alleged abuse who will then investigate the report. Should the Director of Customer Solutions or other leadership concur with the engineer’s assessment, the Director will reach out to you directly. In short, reasonable courtesy should be extended to all parties at all times. Additionally, should you obtain a specific employee’s email address, please do not contact them directly for support. All email inquiries should be directed to support@alta.inc
Please note that the Scope of Support terms are subject to change without notice
Trusted Partners
Alta Labs sources only from top-tier, well-established suppliers for our chipsets and other components. We work exclusively with companies such as Qualcomm, Samsung and Texas Instruments, whose products meet the highest standards for security and performance. This allows us to deliver products that are both reliable and secure for our users.
Compliance, Privacy, and Certifications
Proactive Assurance: Alta Labs may from time to time participate in bug bounty programs such as those posted on the HackerOne website
ISO Compliance: ISO 9001 (Quality), ISO 22301 (Security and Resilience), ISO 27001 (Security Management), ISO 27017 (Cloud Controls), ISO 27701 (Privacy Information Management), ISO 27018 (Personal Data)
PCI (Payment Card Industry) Compliance: PCI DSS (Payment Card Industry Data Security Standards) is a set of security standards defined by the major credit card companies. Alta Labs products in no way jeopardize PCI DSS compliance and our cloud-based management platform back end, AWS, is certified as a Level 1 Service Provider, the highest level available. For more details, see Amazon PCI DSS
HIPAA (Health Insurance Portability and Accountability Act): Designed to protect patient confidentiality, this US federal law defines national standards and security guidelines. Alta Labs' cloud-based management platform is based on AWS. Since there is no HIPAA certification for a cloud service provider such as AWS, to meet the HIPAA requirements applicable to our operating model, AWS aligns its HIPAA risk management program with FedRAMP and NIST 800-53, which are higher security standards that map to the HIPAA Security Rule. NIST supports this alignment and has issued SP 800-66 An Introductory Resource Guide for Implementing the HIPAA Security Rule, which documents how NIST 800-53 aligns with the HIPAA Security Rule. For more information on AWS HIPAA compliance, click here.
GDPR (General Data Protection Regulation): Regulation defined by the European Union to protect customer data and privacy. Security and compliance with the GDPR is a shared responsibility between AWS (Amazon Web Services) and Alta Labs. AWS operates, manages, and controls the components from the operating system and virtualization layer down to the physical security of the facilities in which AWS operates.
CCPA (California Consumer Privacy Act) and CPRA (California Privacy Rights Act): The CRPA builds on and updates the CCPA protection of consumers and their rights. Alta Labs does not route any customer network traffic processed by Alta Labs Wireless Access Points, Network Switches, Routers, Gateways, etc. through its cloud infrastructure. Only customer network configuration information is stored in our cloud management platform.
APA (Australia Privacy Act) and APP (Australian Privacy Principles): The Australia Privacy Act is the primary law regulating privacy rights and handling of personal information by government agencies and private organizations in Australia. The APA established 13 APPs (Australian Privacy Principles). Alta Labs is committed to complying with the requirements of the APA and APP.
Alta Labs Privacy Policy: The Alta Labs Privacy Policy can be found on our website by clicking here.
Data Release to Government Authorities: Alta Labs does not provide government authorities with unwarranted access to any customer data. For any requests to disclose customer data from any government entity (US or across the world), our legal and privacy teams will review the request to ensure validity. Any potential disclosures warranted by potential illegal activity would be limited to data strictly necessary by law.
If you have any questions or concerns about your information, privacy, or any of the details discussed here, please feel free to contact us: