Viewer Application Security Blueprint
Introduction
In today’s digital landscape, Viewer is designed with a strong focus on data security and user privacy.
Viewer application does not retain any data in a database, and does not store information from PDF files.
1. Serverless Architecture
Viewer’s serverless architecture reduces traditional infrastructure risk by minimizing attack surface and helping protect against unauthorized access.
2. Rigorous Data Encryption
Viewer protects data in transit and at rest using:
- TLS 1.2 for data in transit
- AES-256 for data at rest
3. Comprehensive Network Isolation
Viewer uses AWS Virtual Private Cloud (VPC) to isolate its network environment and provide a secure operational boundary.
4. Secure Integration with Salesforce
Viewer integrates with Salesforce using secure APIs and strict access controls to support secure data flow between systems.
5. Multi-Region Resilience and Privacy
Viewer is available in the following AWS regions:
- United States (US)
- European Union (EU)
- Israel (IL)
Multi-region availability supports resilience and regional data handling requirements.
Summary
Viewer’s security blueprint combines:
- Serverless architecture
- Strong encryption
- Network isolation
- Secure Salesforce integration
- Multi-region availability
For additional assistance, contact: info@4winds.app