Infrastructure Security

Last updated: 2026-01-13

Infrastructure Security

Gray Ghost Data Consultants operates a cloud-native infrastructure designed for security, reliability, and scalability. This document outlines our infrastructure security controls.

Cloud Architecture

Platform Components

ComponentProviderPurpose
Frontend HostingVercelNext.js application hosting
API BackendGoogle Cloud RunFastAPI services
DatabaseSupabasePostgreSQL with built-in security
AuthenticationClerkIdentity and access management
CDN/WAFCloudflareDDoS protection and caching
EmailResendTransactional email delivery

Environment Separation

We maintain strict separation between environments:

Production    → production.grayghostdata.com
Staging       → staging.grayghostdata.com  
Development   → dev.grayghostdata.com (internal only)
  • No production data in non-production environments
  • Separate credentials and secrets per environment
  • Network isolation between environments
  • Promotion pipeline with security gates

Network Security

Perimeter Defense

  • Web Application Firewall (WAF): Cloudflare WAF with OWASP ruleset
  • DDoS Protection: Layer 3/4/7 DDoS mitigation via Cloudflare
  • Rate Limiting: Application-level rate limiting (100 req/min per client)
  • IP Allowlisting: Available for enterprise clients

Traffic Encryption

  • All external traffic encrypted via TLS 1.3
  • HSTS enabled with 2-year max-age
  • Certificate transparency logging
  • Automated certificate renewal via Let's Encrypt

Internal Communication

  • Service-to-service communication authenticated
  • Internal APIs not exposed to public internet
  • Webhook endpoints protected by shared secrets
  • Database connections via encrypted tunnels

Compute Security

Container Security

  • Minimal base images (distroless where possible)
  • No root privileges in containers
  • Read-only file systems
  • Resource limits enforced (CPU, memory)

Cloud Run Configuration

# Security settings applied to all services
securityContext:
  runAsNonRoot: true
  readOnlyRootFilesystem: true
  allowPrivilegeEscalation: false

Secrets Management

  • Secrets stored in Google Cloud Secret Manager
  • Runtime injection (never in code or images)
  • Automated secret rotation where supported
  • Access to secrets logged and auditable

Database Security

Supabase Configuration

  • Row Level Security (RLS): Enforced on all tables
  • Connection Pooling: PgBouncer for connection management
  • SSL Required: All database connections require SSL
  • IP Restrictions: Database accessible only from application services

Access Control

-- Example RLS policy (tenant isolation)
CREATE POLICY "tenant_isolation" ON clients
  FOR ALL
  USING (tenantid = auth.jwt() ->> 'tenantid');

Backup Strategy

TypeFrequencyRetentionLocation
Point-in-TimeContinuous7 daysSupabase
Daily SnapshotDaily30 daysGCS (encrypted)
Weekly ArchiveWeekly1 yearGCS (encrypted)

Monitoring and Logging

Security Monitoring

  • SIEM Integration: Centralized log aggregation
  • Anomaly Detection: Automated alerting on suspicious patterns
  • Audit Logging: All administrative actions logged
  • Uptime Monitoring: 99.9% availability target

Log Retention

Log TypeRetentionStorage
Application Logs30 daysCloud Logging
Security Events1 yearSIEM
Audit Logs7 yearsArchived storage
Access Logs90 daysCloud Logging

Alerting Thresholds

EventThresholdResponse
Auth Failures>100/5minAuto-block + alert
5xx Errors>10/minPage on-call
Rate Limit Exceeded>50/10minAlert
SLA BreachAnyPage on-call

Vulnerability Management

Scanning Schedule

  • Container Images: Scanned on every build
  • Dependencies: Daily dependency vulnerability scan
  • Infrastructure: Weekly infrastructure scanning
  • Penetration Testing: Annual third-party assessment

Patch Management

PrioritySLADescription
Critical24 hoursActively exploited vulnerabilities
High7 daysHigh CVSS, no known exploit
Medium30 daysModerate risk vulnerabilities
Low90 daysLow risk, scheduled maintenance

Disaster Recovery

Recovery Objectives

  • Recovery Time Objective (RTO): 4 hours
  • Recovery Point Objective (RPO): 1 hour

Failover Capabilities

  • Multi-region database replicas (standby)
  • Automated failover for compute services
  • DNS failover for regional outages
  • Regular DR testing (quarterly)

Compliance Certifications

Our infrastructure providers maintain:

ProviderCertifications
Google CloudSOC 1/2/3, ISO 27001, PCI DSS
SupabaseSOC 2 Type II
VercelSOC 2 Type II
CloudflareSOC 2 Type II, ISO 27001