BeakrGo to website
Docs/Security/Infrastructure & network

Infrastructure & network security

Beakr runs on AWS in us-east-1 with a multi-AZ architecture for high availability. All infrastructure is defined in Terraform, peer-reviewed, and deployed through CI/CD.

Network topology

Compute

Database

Cache

Web Application Firewall (WAF)

AWS WAF protects the application at the edge:

RuleWhat it blocks
OWASP Top 10 (AWS Managed)XSS, local/remote file inclusion, common exploits.
SQL Injection PreventionInspects query strings, request bodies, URI paths, and headers.
Known Bad InputsLog4j exploits, known CVE patterns, malicious user agents.
IP Reputation ListBlocks known malicious IPs, botnets, and TOR exit nodes (AWS Managed).
Rate LimitingPer-IP request rate limiting. Exceeding the limit results in automatic blocking.

Security headers

All responses include:

Monitoring, logging & incident response

Audit logging

Threat detection

Infrastructure as Code

All infrastructure is defined in Terraform, version-controlled in Git, and reviewed via pull requests before deployment. No manual infrastructure changes.

Single-tenant deployment

For enterprise customers with regulatory or contractual requirements for dedicated infrastructure:

Dedicated database

Your data lives in a completely separate PostgreSQL instance, connected to our managed application platform. Same application, isolated storage.

Full infrastructure isolation

A complete, dedicated deployment including VPC, database, cache, compute, and load balancer. No shared components with other customers.

Both options use the same codebase and receive the same updates as our multi-tenant platform. Contact support@thebeakr.com for pricing and configuration.