Security
We understand that security is the top priority for our customers and partners. Our security program is built upon industry best practices and a defense-in-depth approach, ensuring the protection of customer data across every layer of our service.
Infrastructure & Network Security
Our infrastructure is designed with security as a top priority from the outset, isolating critical systems and minimizing the attack surface.
- Network Isolation: All core systems and resources are deployed in private subnets within a Virtual Private Cloud (VPC), achieving complete logical isolation from the public internet.
- Principle of Least Privilege: Strict firewall rules are enforced to allow access only to essential ports and services. All network traffic is continuously monitored to detect and block malicious activities.
- Advanced Threat Prevention: A sophisticated Web Application Firewall (WAF) equipped with comprehensive automated security features — including IP reputation filtering, rate limiting, malicious bot detection, geo-blocking, scanner and reconnaissance defense, HTTP flood mitigation, and real-time traffic analysis — protects the service from OWASP Top 10 vulnerabilities, SQL injection, cross-site scripting (XSS), and emerging threats.
Data Protection
We implement robust measures to protect data in transit and at rest, ensuring its confidentiality and integrity.
- Encryption: All sensitive data is encrypted both in transit (via TLS) and at rest.
- Secret Management: No authentication credentials or sensitive configurations are stored in source code. All secret information is securely managed through a dedicated secret management service, with strictly controlled and monitored access.
- AI Model Training Protection: We do not use any user-submitted content, including personal information and uploaded data, for training or improving AI models. Customer data remains private and is used solely for the purpose of service delivery.
Application Security
We embed security into every stage of the development lifecycle.
- Secure by Design: Our services are designed to minimize security risks. Instead of static, long-lived access keys, all internal operations utilize temporary credentials (IAM roles and STS) that are automatically refreshed.
- API Security: Access to core API endpoints is protected by strong authentication mechanisms, ensuring that only authorized clients can perform sensitive operations.
Access Control
We enforce strict access control policies to ensure that only authorized personnel can access systems and data.
- Secure Access: Internal networks and management interfaces are accessible only through secure VPN connections that require multi-factor authentication (MFA).