Architecture & encryption
Architecture & encryption
Infrastructure, data flow, encryption standards, and security operations.
Cloud infrastructure
- Amazon Web Services (AWS) as the primary cloud service provider
- Amazon Elastic Container Service (ECS) for application hosting
- Redis for event queue management
- PostgreSQL for persistent data storage
- ClickHouse for high-performance analytics and observability data warehousing
Data flow
- Client requests are sent to the API server hosted on AWS ECS
- During LLM inference operations, events are generated and pushed to Redis queue
- Celery workers consume these events from Redis
- Data is batch inserted into PostgreSQL and ClickHouse
Encryption
- In transit: All API communications secured via TLS 1.2+ (HTTPS)
- At rest: AES-256 encryption for all data in PostgreSQL and ClickHouse
- Credentials: API keys hashed using SHA-256 before storage
- Inter-service: Secured through AWS security groups
Access controls
- Multi-factor authentication (MFA) required
- Role-based access control (RBAC) with least privilege
- Just-in-time (JIT) access for administrative functions
- Regular access reviews and deprovisioning
- No default employee access to customer data
Data residency
- Primary data centers in US East (Virginia) and US West (Oregon)
- EU data residency available upon request
- Data never leaves your specified geographic region
Security operations
- Regular internal security audits
- Weekly security testing of applications
- Continuous monitoring via AWS CloudWatch
- Regular code reviews for all deployments
- Vulnerability scanning and penetration testing
Business continuity
- Recovery Time Objective (RTO): 4 hours
- Recovery Point Objective (RPO): 1 hour
- Automated daily backups with cross-region replication
- Regular disaster recovery testing
Incident response
- Dedicated incident response team with defined roles
- Customer notification within 24 hours of any security incident
- Detailed incident reports and remediation plans
- Post-incident reviews and continuous improvement
Security reports
Detailed security architecture documentation, penetration test reports, and compliance certificates are available to enterprise customers under NDA.
Contact: team@respan.ai