Skip to main content

Viewer Application Security Blueprint

Introduction

In today’s digital landscape, Viewer is designed with a strong focus on data security and user privacy.

Viewer application does not retain any data in a database, and does not store information from PDF files.

1. Serverless Architecture

Viewer’s serverless architecture reduces traditional infrastructure risk by minimizing attack surface and helping protect against unauthorized access.

2. Rigorous Data Encryption

Viewer protects data in transit and at rest using:

  • TLS 1.2 for data in transit
  • AES-256 for data at rest

3. Comprehensive Network Isolation

Viewer uses AWS Virtual Private Cloud (VPC) to isolate its network environment and provide a secure operational boundary.

4. Secure Integration with Salesforce

Viewer integrates with Salesforce using secure APIs and strict access controls to support secure data flow between systems.

5. Multi-Region Resilience and Privacy

Viewer is available in the following AWS regions:

  1. United States (US)
  2. European Union (EU)
  3. Israel (IL)

Multi-region availability supports resilience and regional data handling requirements.

Summary

Viewer’s security blueprint combines:

  • Serverless architecture
  • Strong encryption
  • Network isolation
  • Secure Salesforce integration
  • Multi-region availability

For additional assistance, contact: info@4winds.app