Architecture
CITSmart Cloud Architecture
5min
focused on a global expansion, and a technological infrastructure that meets the requirements of our customers and partners, citsmart citsmart opted for the saas ( software as a service ) model to ensure agility in delivering solutions to our customers and partners, and provide a resilient, reliable and secure infrastructure ensure agility in delivering solutions to our customers and partners, and provide a resilient, reliable and secure infrastructure in the cloud, we have a computational infrastructure and a network architecture designed to meet the highest technological and security requirements of the world market following the example of large companies offering their services based on cloud based solutions, citsmart citsmart uses the technology and security features provided by amazon web services (aws) using the aws cloud, we, our partners, and customers can enjoy a highly scalable computing platform with high reliability and availability and physical security designed for large scales a legacy of managing various compliance programs and certifications this means that we automatically inherit compliance with various infrastructure requirements and standards in addition to the capabilities provided by the cloud, citsmart citsmart seeks to maintain the security and privacy of its customers' data through internal policies and the adoption of standards maintain the security and privacy of its customers' data through internal policies and the adoption of standards to ensure compliance with international regulatory requirements cloud architecture overview a basic overview of how the citsmart citsmart cloud works can be seen in the diagram below cloud on premises inv/evm citsmart cloud security citsmart citsmart has security compliance based on the following areas in which it is responsible within the cloud environment customer data platform, applications, identity & access management operating system , network & firewall client side data encryption data integrity authentication server side encryption (file system and data) network traffic protection (encryption, integrity, identity) for each area above, we have technical security processes and measures that ensure security compliance based on best market practices