Tailwinds Security and Deployment

This article details the deployment model of Tailwinds, data security posture and other relevant material.

Tailwinds Deployment Overview

Tailwinds is designed with a strong emphasis on security, scalability, and isolation. Our architecture ensures that each customer's deployment is completely separate, providing maximum security and performance.

Key Security Features

  1. Dedicated Infrastructure: Each customer receives their own unique deployment of Tailwinds SaaS, including dedicated hardware and servers.

  2. Complete Isolation: There is no data overlap between customers. Each deployment is fully isolated from others, ensuring data privacy and security.

  3. Virtual Private Cloud (VPC): Every customer's deployment resides in its own VPC, providing network-level isolation.

  4. AWS Web Application Firewall (WAF): Protects your applications from common web exploits that could affect availability, compromise security, or consume excessive resources.

  5. Application Load Balancer (ALB): Automatically distributes incoming application traffic across multiple targets, enhancing fault tolerance.

Deployment Architecture

Our deployment architecture leverages several AWS services to ensure security, scalability, and high availability:

  1. AWS WAF: Sits at the front, protecting against web-based attacks.

  2. Application Load Balancer (ALB): Distributes traffic across multiple Tailwinds instances.

  3. Amazon ECS (Elastic Container Service): Runs Tailwinds in containers, allowing for easy scaling and management.

  4. Amazon EFS (Elastic File System): Provides scalable, elastic file storage for the containers.

  5. Amazon RDS: Offers a scalable, high-performance database solution.

Benefits of Our Architecture

  1. Scalability: The containerized architecture allows for easy scaling to meet demand.

  2. High Availability: Multiple containers across different availability zones ensure continuous service.

  3. Security: Multi-layered security approach with WAF, VPC isolation, and dedicated resources.

  4. Performance: Dedicated resources ensure consistent performance for each customer.

  5. Compliance: Our architecture helps support various compliance requirements due to its isolation model.

Reference Architecture

Continuous Monitoring and Updates

We continuously monitor all deployments for security and performance. Regular updates and patches are applied to ensure your Tailwinds deployment remains secure and up-to-date.

For more detailed information about our security practices or deployment options, please contact our support team.

Last updated