Protocols

The Soteris platform uses the following security protocols to provide a secure, reliable experience.

Soteris personnel are granted access to resources on a least-privilege basis.

All your data is encrypted both in transit and at rest.

AWS S3 buckets are configured for private access only with encryption at rest.

Analytical databases containing customer data are kept secure with hosting on private subnets, encryption at rest, configuration to permit connections using SSL encryption only and accessibility only via authenticated client VPN for Soteris personnel.

Each Soteris customer model scoring endpoint in hosted on separate infrastructure in private subnets, and ingress for API calls is permitted only through a public internet gateway.

Model scoring endpoints are stateless and have no database access, eliminating the possibility of SQL injection attacks.

With Amazon CloudTrail, we log, monitor and retain account activity related to actions across our Amazon Web Services infrastructure.

Our Amazon Web Services infrastructure is managed using an Infrastructure as Code (IaC) platform, so state and configuration are version controlled.

Our platform performs with a near-perfect uptime, so you can count on your Soteris model scoring endpoint to be there when you need it.

If you have any questions about Soteris security, please contact us.