Architecture & encryption

Infrastructure, data flow, encryption standards, and security operations.

Cloud infrastructure

  • Amazon Web Services (AWS) as the primary cloud service provider
  • Amazon Elastic Container Service (ECS) for application hosting
  • Redis for event queue management
  • PostgreSQL for persistent data storage
  • ClickHouse for high-performance analytics and observability data warehousing

Data flow

  1. Client requests are sent to the API server hosted on AWS ECS
  2. During LLM inference operations, events are generated and pushed to Redis queue
  3. Celery workers consume these events from Redis
  4. Data is batch inserted into PostgreSQL and ClickHouse

Encryption

  • In transit: All API communications secured via TLS 1.2+ (HTTPS)
  • At rest: AES-256 encryption for all data in PostgreSQL and ClickHouse
  • Credentials: API keys hashed using SHA-256 before storage
  • Inter-service: Secured through AWS security groups

Access controls

  • Multi-factor authentication (MFA) required
  • Role-based access control (RBAC) with least privilege
  • Just-in-time (JIT) access for administrative functions
  • Regular access reviews and deprovisioning
  • No default employee access to customer data

Data residency

  • Primary data centers in US East (Virginia) and US West (Oregon)
  • EU data residency available upon request
  • Data never leaves your specified geographic region

Security operations

  • Regular internal security audits
  • Weekly security testing of applications
  • Continuous monitoring via AWS CloudWatch
  • Regular code reviews for all deployments
  • Vulnerability scanning and penetration testing

Business continuity

  • Recovery Time Objective (RTO): 4 hours
  • Recovery Point Objective (RPO): 1 hour
  • Automated daily backups with cross-region replication
  • Regular disaster recovery testing

Incident response

  • Dedicated incident response team with defined roles
  • Customer notification within 24 hours of any security incident
  • Detailed incident reports and remediation plans
  • Post-incident reviews and continuous improvement

Security reports

Detailed security architecture documentation, penetration test reports, and compliance certificates are available to enterprise customers under NDA.

Contact: team@respan.ai