Skip to content

Security Architecture

Overview

Solatis is built with security as a foundational pillar. Our architecture follows zero-trust principles, defense-in-depth strategies, and industry best practices.

┌─────────────────────────────────────┐
│      Client Applications            │
│   (Web, API, Mobile, Desktop)       │
└──────────────┬──────────────────────┘
               │ TLS 1.3

┌─────────────────────────────────────┐
│      API Gateway & WAF              │
│   (Rate Limiting, DDoS Protection)  │
└──────────────┬──────────────────────┘
               │ Authenticated

┌─────────────────────────────────────┐
│      Authentication Layer           │
│   (OAuth 2.0, SAML, API Keys)       │
└──────────────┬──────────────────────┘

        ┌──────┴──────┐
        ▼             ▼
   ┌────────┐    ┌──────────┐
   │ Auth   │    │ Role-Based
   │Service │    │ Access   │
   └────────┘    └──────────┘


┌─────────────────────────────────────┐
│    Microservices (Encrypted)        │
│   (Documents, Agents, Analytics)    │
└──────────────┬──────────────────────┘

        ┌──────┴──────────┐
        ▼                 ▼
   ┌─────────┐      ┌──────────────┐
   │Database │      │ Blob Storage │
   │(AES-256)│      │ (AES-256)    │
   └─────────┘      └──────────────┘

Security Layers

1. Network Security

TLS/SSL Encryption

  • All data in transit uses TLS 1.3
  • Certificate pinning for critical connections
  • Perfect forward secrecy enabled
  • No weak ciphers allowed

DDoS Protection

  • Global CDN with DDoS mitigation
  • Rate limiting at multiple levels
  • IP-based threat detection
  • Automatic blocking of malicious traffic

Web Application Firewall (WAF)

  • Protects against OWASP Top 10
  • SQL injection prevention
  • XSS protection
  • CSRF tokens on all forms

2. Authentication & Authorization

Multi-Factor Authentication

  • TOTP (Time-based One-Time Password)
  • Backup codes for account recovery
  • Hardware security keys (FIDO2/U2F)
  • Biometric on mobile

Single Sign-On (SSO)

  • OAuth 2.0 support
  • OpenID Connect (OIDC)
  • SAML 2.0 for enterprises
  • Custom identity providers

Authorization

  • Role-Based Access Control (RBAC)
  • Attribute-Based Access Control (ABAC)
  • Organization-scoped permissions
  • Team-level access management

3. Data Security

Encryption at Rest

  • AES-256 encryption for all data
  • Separate encryption keys per customer
  • Key rotation every 90 days
  • Encrypted backups

Encryption in Transit

  • TLS 1.3 for all connections
  • Message-level encryption for critical data
  • Encrypted message queues
  • Secure API protocols

Data Isolation

  • Tenant data completely isolated
  • Separate database schemas per organization
  • Independent encryption keys
  • No cross-tenant data leakage

4. Application Security

Secure Development

  • SAST (Static Application Security Testing)
  • DAST (Dynamic Application Security Testing)
  • Dependency scanning for vulnerabilities
  • Security code review process

API Security

  • API authentication required
  • Rate limiting per API key
  • IP whitelisting available
  • Audit logging for all API calls

Secrets Management

  • No secrets in code repositories
  • HashiCorp Vault for secret storage
  • Automatic secret rotation
  • Secure credential injection

5. Infrastructure Security

Cloud Infrastructure

  • AWS/Google Cloud with security best practices
  • VPC isolation for Solatis infrastructure
  • Security groups limiting access
  • No public database exposure

Container Security

  • Minimal base images
  • Container image scanning
  • Runtime security monitoring
  • Pod security policies

Kubernetes Security

  • RBAC for pod access
  • Network policies isolating pods
  • Pod security standards
  • Admission controllers

6. Access Control

Employee Access

  • Zero-trust access model
  • Principle of least privilege
  • MFA required for all employees
  • Access approval workflow

Privileged Access

  • Separate privileged accounts
  • Time-limited access grants
  • Session recording
  • Audit logging for all privileged actions

Third-Party Access

  • Vendor security assessments
  • Contracts with security requirements
  • Limited scope access
  • Regular audits

Compliance & Standards

Certifications

  • SOC 2 Type II: Annual audits, continuous monitoring
  • ISO 27001: Information security management
  • GDPR: EU data protection compliance
  • HIPAA: Healthcare data eligibility
  • PCI DSS: Payment card data security (if applicable)

Data Residency

Solatis supports multiple data residency options:

RegionLocationCompliance
USVirginia, OregonSOC 2, HIPAA
EUGermany, IrelandGDPR, ISO 27001
APACSingaporeLocal data laws
CustomAny regionOn request

Incident Response

Response Process

  1. Detection: Automated alerting and monitoring
  2. Assessment: Immediate impact analysis
  3. Containment: Isolation of affected systems
  4. Remediation: Fix and verification
  5. Communication: Customer notification
  6. Review: Post-incident analysis

Security Incident SLA

SeverityResponse TimeUpdate Frequency
Critical15 minutesEvery 30 minutes
High1 hourEvery 2 hours
Medium4 hoursEvery 24 hours
Low24 hoursAs needed

Security Monitoring

24/7 Security Operations Center (SOC)

  • Real-time threat monitoring
  • Intrusion detection systems
  • Behavioral analysis
  • Automated response to threats

Logging & Monitoring

  • All access logged
  • API calls logged
  • Configuration changes logged
  • Security events tracked

Vulnerability Management

  • Regular penetration testing
  • Bug bounty program
  • Dependency updates
  • Security patches deployed within 24 hours

Disaster Recovery

Backup Strategy

  • Automated daily backups
  • Geographic redundancy
  • Encryption of backups
  • Tested restoration process

Business Continuity

  • RTO (Recovery Time Objective): < 1 hour
  • RPO (Recovery Point Objective): < 15 minutes
  • Failover to secondary region
  • Load balancing across regions

Security Best Practices for Users

Account Security

  • Use strong, unique passwords
  • Enable multi-factor authentication
  • Regularly review access logs
  • Use SSO when available

API Key Security

  • Store API keys securely (use secret managers)
  • Rotate keys regularly
  • Use scoped API keys for specific tasks
  • Never commit keys to version control

Data Handling

  • Classify data appropriately
  • Apply correct access controls
  • Use encryption for sensitive data
  • Monitor access logs

Security Updates

Stay informed about security:

Reporting Security Issues

Found a security vulnerability?

Please report responsibly:

  1. Email: security@solatis.team
  2. Do not disclose publicly
  3. Include proof of concept
  4. Expected response: 24 hours
  5. Eligible for bug bounty program

Questions?

For security questions or concerns:

  • Email: security@solatis.team
  • Support: support@solatis.team
  • Enterprise: enterprise@solatis.team

Released under the MIT License.