Stackk being a custodian of customers' data, a multi-fold model of security architecture, robust product delivery and highly resiliant service platform, are the key tenets of it's service delivery.

Protecting your data

We understand the value of data. With our robust system of data safeguards, we allow you to focus on the data rather than on its security.

  • Virtual Private Cloud
  • Hosted in dedicated VPCs in non-promiscuous mode that are further segmented for increased security and manageability.
  • Perimeter Security
  • Routing rules hardened based on pre-established criteria for various permissible transactions across all resources.
  • Access Controls
  • Role-based access through IAM that enforces segregation of duties, two-factor authentication and end-to-end audit trails ensuring access is in accordance with security context.
  • Encryption
  • AES 256 bit encryption with 1,024 bit key-strength for data at Rest and FIPS 140-2 compliant TLS encryption for data in transit.
  • Management Plane
  • Secure administrative tunnel with whitelisted IP addresses for secure connection to the servers for administrative purposes, through a bastion host.
  • Malware & Spam Protection
  • Malware and Spam protection applied based on latest threat signatures and supports real-time scanning and security.

Highly Resilient Architecture

The architecture is built with resiliency in mind that ensure high availability for the product and data.

  • Component Redundancy
  • All components are deployed in ‘n+1’ mode across multiple availability zones configured in active - active mode behind a load balancing service.
  • Highly Scalable DNS
  • Route users to the best endpoint based on geo-proximity, latency, health, and other considerations.
  • Platform Load Balancing
  • Automatically distribute application traffic across multiple availability zones that supports high availability, auto scaling and robust security.
  • Data Backup
  • Near real-time backups taken across multiple availability zones in encrypted and access controlled containers.
  • Capacity Management
  • Proactive capacity monitoring based on conservative thresholds and on-demand capacity expansion capability through our highly elastic hosting partners.