AWS Security Architecture Diagram

AWS Security Architecture Diagram

  • Region
  • Ingress Ports and IP addresses
  • Egress Ports and IP addresses
  • Connected resources EC2 instances / Network Interfaces / Load Balancers
  • Tags

How secure is Hava?

What DATA Does Hava Use?

WHAT DATA DOES HAVA STORE?

IS HAVA DATA ENCRYPTED?

WHAT PROTECTION IS IN PLACE AGAINST UNAUTHORISED ACCESS?

CAN YOU SELF HOST HAVA?

WHERE ARE THE HAVA SAAS DATABASE AND APPLICATIONS HOSTED?

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store