Skip to content

Security Overview

Stackbooster.io prioritizes the security of your Kubernetes infrastructure and data. This overview explains our security architecture, practices, and recommendations to ensure your environment remains protected while benefiting from our optimization capabilities.

Security Architecture

Stackbooster.io employs a multi-layered security approach:

Infrastructure Security

Our platform runs on enterprise-grade cloud infrastructure with:

  • SOC 2 Type II certified data centers
  • Network-level protection including WAF and DDoS mitigation
  • Encrypted data storage and transmission (AES-256 and TLS 1.2+)
  • Regular security scanning and penetration testing

Authentication and Access Control

We implement strict identity management:

  • Multi-factor authentication for all user accounts
  • Role-based access control (RBAC) with principle of least privilege
  • Session timeout and IP-based access restrictions
  • Audit logging of all authentication events
  • Single Sign-On (SSO) integration with major identity providers

Data Protection

Your data is protected through:

  • Encryption at rest for all stored data
  • Encryption in transit using TLS 1.2+
  • Data minimization practices (we collect only what's needed)
  • Regular data purging for non-essential information
  • Isolation between customer environments

Kubernetes Integration Security

Our Kubernetes agent operates with:

  • Minimal required permissions following least-privilege principles
  • Read-only access by default, with opt-in for write operations
  • No direct access to your application data or secrets
  • Signed and verified container images
  • Regular security updates and patches

Compliance and Certifications

Stackbooster.io maintains compliance with industry standards:

  • SOC 2 Type II certified
  • GDPR compliant
  • ISO 27001 aligned practices
  • Regular third-party security assessments

Security Best Practices

To ensure the most secure implementation, we recommend:

  1. Follow our security best practices for account setup
  2. Regularly review access logs and permission settings
  3. Use dedicated AWS accounts for different environments
  4. Implement network isolation for production clusters
  5. Enable all recommended security features in your EKS clusters

Reporting Security Concerns

If you discover a security vulnerability or have concerns:

  1. Email our security team immediately at [email protected]
  2. Include detailed information about the potential issue
  3. Do not disclose the issue publicly until we've addressed it

Our security team will acknowledge your report within 24 hours and provide regular updates until resolution.

Security Documentation

For more detailed information, refer to these security documents:

If you have specific security requirements or questions, please contact our security team.

Released under the MIT License. Contact us at [email protected]