Kinesis Cloud

Security & Privacy at Kinesis Cloud

Overview of security and privacy protocols, controls, and commitments at Kinesis Cloud, including infrastructure, network, data, compliance, and transparency.

Our commitment to your data and workloads.

Introduction

At Kinesis Cloud, we take the security and privacy of our customers’ workloads very seriously. Our platform is designed from the ground up to safeguard containerized applications across datacenters, clouds, and even customer-owned infrastructure.

This document provides an overview of our security posture and the measures we take to protect customer environments.

1. Infrastructure Security

  • Trusted Datacenter ProvidersWe source compute and network capacity from reputable operators including AWS, Google Cloud, OVH, Hyperstack, and others. These providers maintain their own certifications (e.g., SOC 2, ISO/IEC 27001) and enforce strong physical and operational controls.

  • Multi-Datacenter ArchitectureOur platform spans multiple facilities and providers, ensuring redundancy and resiliency. This geographic diversity minimizes single-point-of-failure risks.

  • Customer-Owned InfrastructureCustomers may also connect their own machines to the Kinesis Cloud control panel. In those cases, physical and local infrastructure security remains the customer’s responsibility.

2. Network & Transport Security

  • Encrypted ConnectionsAll communications are encrypted using TLS/SSL. Node-to-node and inter-datacenter communication runs over WireGuard VPN tunnels with modern cryptography.

  • Segmentation & IsolationCustomer workloads are logically isolated at both the network and orchestration layers.

  • Resilient GatewaysProven technologies such as HAProxy and Nginx provide TLS termination, traffic management, and high-availability load balancing.

3. Platform & Container Security

  • Container RuntimeWorkloads run on Docker, hardened with additional controls and monitoring.

  • Host Hardening & UpdatesWe standardize on Ubuntu LTS, with hardened configurations and a strict patching process. Regular updates ensure that all nodes are “up to snuff” with the latest security fixes.

  • Automatic FailoverIn case of server or datacenter disruption, workloads automatically reschedule to healthy environments.

  • Customer ImagesCustomers control the content of their containers. We encourage best practices such as signed images, vulnerability scanning, and minimal base layers.

4. Application & Data Layer

  • Backend StackOur control plane and services are built with robust, industry-standard languages such as C# and Go, chosen for performance, reliability, and maintainability.

  • Database SecurityWe use MongoDB Atlas, a fully managed service that maintains the recommended release level, provides automated patching, and includes built-in encryption and backups.

  • Encryption at Rest & in TransitAll sensitive data is encrypted at rest and protected in transit with TLS.

5. Data Protection & Privacy

  • Customer Data OwnershipCustomers retain full ownership of their images, data, and workloads. Kinesis Cloud does not access application data except when explicitly required for support.

  • Minimal Metadata CollectionWe collect only the telemetry required to operate and improve the platform. Logs and control plane data are retained only as long as necessary.

  • Privacy by DesignOur architecture minimizes unnecessary exposure of customer information and adheres to industry best practices.

6. Monitoring & Operations

  • Continuous MonitoringOur systems continuously track cluster health, network integrity, and anomalies.

  • Incident ResponseA documented incident response process ensures rapid isolation, remediation, and transparent communication.

  • Proactive PatchingAll critical components — Ubuntu, WireGuard, HAProxy, Nginx, Docker, MongoDB Atlas — are patched promptly and systematically.

7. Leadership & Expertise

  • Experienced TeamKinesis Cloud is led by industry veterans with backgrounds at AWS, Microsoft, Meta, Mozilla, and IBM. Many bring direct security expertise, shaping our policies and practices from day one.

  • Culture of SecuritySecurity is integrated into our development lifecycle and operational playbooks, not treated as an afterthought.

8. Shared Responsibility

Security in the cloud is a shared responsibility:

  • Kinesis Cloud secures the orchestration system, control plane, networking fabric, and infrastructure we provide.

  • Customers secure their images, application code, secrets, and any infrastructure they connect to our control plane.

9. Compliance Alignment

While we are in the process of pursuing formal certifications, our controls align with globally recognized standards:

  • ISO/IEC 27001 (Information Security Management)
  • SOC 2 (Trust Services Criteria)
  • CSA STAR (Cloud Security Alliance) best practices

We can provide additional documentation to support customer audits and due diligence.

10. Commitment to Transparency

We believe security depends on trust and openness. We are committed to:

  • Publishing clear documentation of our controls.
  • Engaging directly with customers during security reviews.
  • Continuously improving our posture as threats evolve.