Anuta ATOM Cloud follows the tenets of security by design. While flexibility & user experience is at the forefront of the ATOM Cloud, Security remains at the heart of every component placed into its architecture. With ATOM Cloud being the custodian of customer network data, security by design combined with high resiliency helps us through all the threat vectors and gauges to strengthen ATOM Cloud’s security posture. As part of this commitment, we use secure hosting partners, industry-standard security technologies, a comprehensive set of policies and controls, and maintain a culture of security throughout ATOM Cloud.
Foundation of ATOM Cloud Security
Physical Data Center
Security
Anchored in AWS, ATOM Cloud
utilizes all physical security
controls that it offers
utilizes all physical security
controls that it offers
Multiple layers of security
Anchored in AWS, ATOM Cloud utilizes all physical security controls that it offers
Perimeter Security
Routing rules hardened based on pre-established criteria for various permissible transactions across all resources.
External & Environmental threats
Protection offered to paint, power & pipe of the data centers to ensure uninterrupted service delivery
Datacenter access
Physical access to AWS facilities is strictly limited to select AWS staff
Customer Data Security
Ensures data privacy and
data loss prevention
through best practices
data loss prevention
through best practices
Multi-tenant Infrastructure
Complete data segregation & isolation through comprehensive multi-tenancy capabilities
Virtual Private Cloud
Hosted in dedicated VPCs in a non-promiscuous mode that is further segmented for increased security and manageability.
Encryption
AES 256 bit encryption with 1,024-bit key-strength for data at rest and FIPS 140-2 compliant TLS encryption for data in transit.
Dedicated Instance
Stringent requirements will be met with dedicated application containers & instances for each tenant.
Flexible retention & Data deletion
Automated handling of customer network data & GDPR data on Anuta ATOM Cloud
Security Standards, Compliance & Risk Management
SOC2 Audit & Certification In Progress,
Risk Mitigation,
Security Controls
Risk Mitigation,
Security Controls
AICPA SOC2 Type 1 & 2
Anuta Networks is currently undergoing SOC2 audit & certification process. Anuta is being verified not only
for its platform ATOM Cloud, its remote agents, cloud endpoints, but also for its internal
security policies, processes, and employees.
GDPR & EU
Anuta Networks is getting ready to enable its customers who elect to process personal data
on our products & website to do so by following the GDPR & applicable data protection
laws. We are working to ensure that our practices and contracts are prepared to support
customers who wish to include their personal and business-critical data.
ISO 27001 Security
Anuta Networks is committed to customer data protection and
hence plans to get ISO 27001 information security management certified in the coming
days.
24x7 risk management
Anuta Networks has engaged an InfoSec team that keeps a tab
on any changes to the security posture of itself or its offerings.
ATOM Instance & Network Security
Powered by the 4C's of Cloud Native
Security- Cloud, Cluster,
Container & Code
Security- Cloud, Cluster,
Container & Code
Microservices Architecture
Every microservice runs inside a well-defined Docker container that allows specific levels of access to select controllers
Component Redundancy
Each component is deployed with full resiliency & disaster recovery mode to ensure high availability, even across multi-availability zones
Technical security compliance
Best practices for Docker & Kubernetes applied to harden the application. High visibility into images, registries, deployments & runtime ensured.
API throttling
The number of API calls is throttled (Rate limited) to mitigate application layer DDOS and Brute Force attacks.
Capacity Management
Threshold-based capacity monitoring & subsequent auto-scaling to offer on-demand capacity expansion.
Data Backup
Near real-time backups taken across multiple clusters & availability zones in encrypted and access restricted containers.
Access Management
Supported by a secure unified
framework to offer seamless
user access management
framework to offer seamless
user access management
Single Sign-On Support(SSO)
Access to ATOM Cloud via SSO powered by a per namespace OAuth2.0. OAuth2.0 relies on SSL to ensure confidentiality for data between applications & browsers.
Role-based Access Control
Fine-grained RBAC for all features within ATOM Cloud, including the User Interface. Tight Integration with Multi-tenancy for easy user provisioning & access control.
Audited account changes
IDP in ATOM Cloud comes with a rich set of auditing capabilities that records every single login & admin actions
Ecosystem Integration
Integration with LDAP, TACACs+ & AD for a robust user security
Remote Agent Security
Secure, Quick & Easy Installation,
Tenant Aware, Seamless Lifecycle
management
Tenant Aware, Seamless Lifecycle
management
Secure Connectivity
All communications from the remote agent to the ATOM Cloud are
TLS encrypted
No Rogue Agents
All remote agents & their configurations are signed to ensure
authenticity prior to their connection to the ATOM Cloud
High Availability
Never miss out on relevant information about your network due to a
broken agent.
Ease of management
Keep track of the agents at all times with Keepalives running
from ATOM Cloud Agent Manager.