BeakrGo to website
Docs/Security/Business continuity

Business continuity

Beakr maintains business continuity through redundant infrastructure, automated recovery, and defined incident response procedures.

Availability

Beakr targets 99.9% uptime for the production platform. Availability is supported by:

Disaster recovery

ScenarioRPORTOMechanism
Single AZ failure0 (synchronous replication)< 5 minutesMulti-AZ automatic failover (RDS, ElastiCache)
Database corruption< 5 minutes30 -- 60 minutesPoint-in-time recovery from continuous transaction logs
Accidental data deletion01 -- 2 hoursRDS snapshot restore or PITR. S3 versioning (30-day retention).
Full region failureUp to 24 hours4 -- 8 hoursSnapshot restore to alternate region. Terraform-based infrastructure rebuild.

Backup schedule

Incident response

Beakr follows a structured incident response process for security events and service disruptions.

Severity classification

SeverityDefinitionResponse timeNotification
P1 -- CriticalService outage, data breach, or active security incident affecting multiple customers.Within 1 hourAffected customers notified within 4 hours. Status page updated.
P2 -- HighSignificant degradation, security vulnerability with active exploit risk, or single-customer data incident.Within 4 hoursAffected customers notified within 24 hours.
P3 -- MediumMinor degradation, potential vulnerability without active exploit, or non-critical system issue.Within 1 business dayIncluded in next scheduled communication.
P4 -- LowCosmetic issues, informational security findings, or minor configuration drift.Within 5 business daysResolved in normal operations.

Incident response process

  1. Detection. Automated alerting via GuardDuty, CloudTrail anomaly detection, CloudWatch alarms, and WAF. Alerts delivered to on-call via Slack and SNS.
  2. Triage. On-call engineer assesses severity and scope. Incident is classified per the severity table above.
  3. Containment. Immediate actions to limit impact -- isolate affected systems, revoke compromised credentials, block malicious IPs.
  4. Resolution. Root cause identified and remediated. Service restored.
  5. Notification. Affected customers notified per severity timeline. BAA customers receive breach notifications per contractual terms.
  6. Post-incident review. Root cause analysis documented. Preventive measures implemented. Lessons learned shared with the team.

Change management

All changes to the Beakr platform follow a controlled process:

Status and incident history

For real-time platform status and incident history, visit our Trust Center.