Security

Security at Every Layer

Data Border is built on defense-in-depth principles — from hardware-isolated virtual machines and encrypted networking to AES-256-GCM token encryption and per-request audit trails. Security is not a feature we added. It is the architecture.

Infrastructure

Hosted on Audited, Hardened Infrastructure

Data Border runs on a major cloud platform with SOC 2 Type II certification, HIPAA readiness, and security practices designed for the most sensitive workloads. Your data is protected by the same class of infrastructure trusted by healthcare and financial services organizations.

SOC 2 Type II Audited

Our hosting infrastructure is independently audited against SOC 2 Type II controls for security, availability, and confidentiality. Documented controls are regularly reviewed and verified by third-party auditors.

Firecracker Micro-VM Isolation

Every Data Border instance runs inside its own Firecracker virtual machine — the same open-source hypervisor developed at AWS that powers Lambda and Fargate. Full hardware-level isolation, not shared containers.

LUKS Encrypted Volumes

All persistent storage is block-level encrypted using Linux LUKS with AES-XTS. Encryption keys are managed by the platform and are only accessible to processes running on the host assigned to your instance.

WireGuard Mesh Networking

All internal platform communication travels over a WireGuard mesh using 256-bit ChaCha20-Poly1305 encryption with Curve25519 key exchange. Your data is encrypted at every hop.

Default-Deny Networking

Nothing is exposed unless explicitly configured. Internal services communicate over a private IPv6 network that is completely invisible to the public internet. No security group rules to misconfigure.

DDoS Mitigation

Upstream traffic providers perform automated and manual DDoS mitigation including blackhole routing and traffic scrubbing. Your instance is protected before malicious traffic ever arrives.

Application

Application-Level Security Controls

Beyond infrastructure, Data Border implements strict application-level controls purpose-built for protecting Amazon marketplace data.

AES-256-GCM Token Encryption

Amazon refresh tokens are encrypted at rest using AES-256-GCM with SCRYPT key derivation. Each seller's tokens are encrypted with a unique client-provided secret that Data Border never stores.

TLS 1.3 Exclusively

All API traffic is encrypted with TLS 1.3. No support for legacy protocols. Certificates are automatically provisioned and renewed via LetsEncrypt. HSTS headers enforce HTTPS-only access.

Web Application Firewall

ML-powered WAF provides bot detection, credential stuffing prevention, IP reputation scoring, and adaptive rate limiting. Suspicious request patterns are blocked before they reach application code.

Multi-Layer Authentication

Four authentication layers protect Amazon data: JWT tokens, Data Border access tokens, seller access tokens, and the amazonTokenSecret. All four are required before any Amazon data is accessible.

Comprehensive Audit Logging

Every PII access is logged with order ID, seller ID, tenant ID, IP address, user agent, and timestamp. Structured JSON logs integrate with any SIEM platform for compliance reporting.

Intelligent Rate Limiting

Per-order, per-tenant, and per-IP throttling prevents bulk data extraction. PII access is limited to once per hour per order. Suspicious patterns like accessing shipped orders trigger alerts.

Encryption

Data Protection Details

Concrete encryption standards for your security questionnaires and compliance reviews.

At Rest

  • Volumes encrypted with LUKS / AES-XTS
  • Object storage with server-side encryption
  • Amazon tokens encrypted with AES-256-GCM
  • SCRYPT key derivation (memory-hard, brute-force resistant)

In Transit

  • TLS 1.3 for all external API traffic
  • WireGuard (ChaCha20-Poly1305) for all internal traffic
  • Certificate validation on all upstream connections
  • HSTS enforcement prevents protocol downgrade

By Design

  • amazonTokenSecret never stored — Data Border cannot decrypt tokens without it
  • Customer PII fetched on-demand from Amazon, never persisted
  • Labels stored encrypted, delivered direct to printers
  • Scrubbed responses ensure your WMS never sees customer addresses
Compliance

Built for Compliance

Data Border is designed to satisfy the requirements your auditors and partners will ask about.

Amazon Data Protection Policy

Fully aligned with Amazon's SP-API Data Protection Policy. Built-in PII audit trails, data attribution, rate limiting, and suspicious activity detection meet all DPP requirements.

SOC 2 Type II Infrastructure

Hosted on independently audited infrastructure with documented controls for security, availability, processing integrity, confidentiality, and privacy.

HIPAA-Ready Platform

Our infrastructure provider supports HIPAA-compliant workloads and signs Business Associate Agreements (BAAs). Healthcare-grade security controls are standard, not optional.

Vulnerability Remediation SLAs

Critical vulnerabilities patched within 24 hours. High severity within 1 week. Medium within 1 month. Automated dependency scanning and continuous security monitoring.

Security Questions?

If you have specific security or compliance questions, we're happy to discuss our architecture in detail. Contact us to learn more.