SOC2 ready infrastructure intial setup at your favorite host provider including:
- Kubernetes
- Load Balancer
- Database
- Monitoring & Alerting
- User Management
- IAC
- CI/CD
...
What's included
ā Infrastructure As Code (IAC)
A complete infrastructure shipped under Terraform configuration files for easy deployment & control over an initial launch of a Cloud Infrastructure at your favorite host provider Azure, GCP, AWS...
š³ Kubernetes Cluster for scalability
A fully horizontally scalable Kubernetes Cluster spawned at your favorite hosting provider with 2 environments: Staging & Production.
Load Balancer + Networking configuration included
š SOC2 ready layer
A set of rules & configuration around security components for user access, network rules and good practices for a SOC2 ready infrastructure submission to an audit provider.
ā¬ļø Full CI/CD strategy
Every commit gets deployed in either a Staging and/or Production environment for easy Q/A and beta test.
šŗ Monitoring & Alerting
All logs are collected, stored and crawled to trigger alerts at ease. All default resources of instances are being watched: CPU, Memory, Load Pressure, Disk Pressure...
š„ RBAC with the least access design
All users & permissions at defined through the IAC with the least access design allowing users (humans or technical IAM users) to only access what they need and not more.
SOC2 ready infrastructure intial setup at your favorite host provider including:
- Kubernetes
- Load Balancer
- Database
- Monitoring & Alerting
- User Management
- IAC
- CI/CD
...
What's included
ā Infrastructure As Code (IAC)
A complete infrastructure shipped under Terraform configuration files for easy deployment & control over an initial launch of a Cloud Infrastructure at your favorite host provider Azure, GCP, AWS...
š³ Kubernetes Cluster for scalability
A fully horizontally scalable Kubernetes Cluster spawned at your favorite hosting provider with 2 environments: Staging & Production.
Load Balancer + Networking configuration included
š SOC2 ready layer
A set of rules & configuration around security components for user access, network rules and good practices for a SOC2 ready infrastructure submission to an audit provider.
ā¬ļø Full CI/CD strategy
Every commit gets deployed in either a Staging and/or Production environment for easy Q/A and beta test.
šŗ Monitoring & Alerting
All logs are collected, stored and crawled to trigger alerts at ease. All default resources of instances are being watched: CPU, Memory, Load Pressure, Disk Pressure...
š„ RBAC with the least access design
All users & permissions at defined through the IAC with the least access design allowing users (humans or technical IAM users) to only access what they need and not more.