Technical

Documentation

Security

Security is at the core of Expanos. Our systems are designed with multiple layers of protection to ensure data integrity and prevent unauthorized access.

Key security features

  • 🔒 SOC 2 certification: We adhere to industry standards for security, availability, and confidentiality.
  • 🔑 Strong encryption: All data is encrypter in transit and at rest.
  • 🛡️ Third-party penetration testing: Regular security audits by independent experts.
  • 🦺 Limited IAM roles: We use the principle of least privilege wherever possible.
  • 🛜 Isolated from the internet: Worker nodes are isolated from the internet and reject all inbound traffic.
  • 🛑 No external access: We cannot access or modify the machines. We are only able to shut them down. We cannot view your data.
  • 🖥️ Dedicated hardware: Your node is not shared with any other customer, ensuring performance consistency and privacy.

Data and storage

  • NVMe SSDs: Each machine is equipped with high-speed local storage, typically 1 TB in size.
  • Disk encryption: LUKS encryption ensures data at rest is secure.
  • Ephemeral storage model: A one-time encryption passphrase is generated at boot and discarded. Data becomes inaccessible after shutdown.

Note: Expanos machines are designed for ephemeral workloads. Persistent storage should be managed through Kubernetes volumes or AWS services like S3.

Network security

  • Connections between your cluster and Expanos nodes use WireGuard, providing encrypted, low-latency communication.
  • All traffic routes through your cloud provider, ensuring compliance and visibility.

Transparency

Expanos is fully auditable. Customers can request source code for all network configurations and services for review.