# Platform Security & Data Protection
Cloud Ctrl is designed as a secure, cloud-native platform for collecting, processing, and analysing cloud usage, billing, and metadata across multiple cloud providers.
Security is embedded across platform architecture, data handling, identity management, and operational practices.
This page provides a high-level overview of how Cloud Ctrl protects customer data and supports enterprise security requirements.
# Security-First Architecture
Cloud Ctrl is built on Microsoft Azure using a PaaS-first architecture aligned to Azure security best practices.
Core principles include:
- Cloud-native, PaaS-based services
- Strong tenant isolation
- Least-privilege access using managed identities
- Encryption in transit and at rest
- Centralised monitoring and auditability
The platform has evolved across multiple architectural iterations to improve security, scalability, and extensibility.
# Data Protection Overview
Cloud Ctrl processes usage, billing, and configuration metadata only.
# Data Types Processed
- Cloud usage and consumption data
- Billing and pricing metadata
- Tenant configuration and non-sensitive metadata
- Events, alerts, and aggregated statistics
Cloud Ctrl does not:
- Access customer workload data
- Store customer application content
- Require privileged access beyond billing and usage scopes
# Encryption & Secure Transport
# Data in Transit
- All communications use SSL/TLS encryption
- APIs, ingestion pipelines, and portals are encrypted end-to-end
- Azure Front Door provides secure ingress with Web Application Firewall (WAF) protection
# Data at Rest
All stored data is encrypted at rest using Azure-managed encryption:
- Azure Data Explorer (usage, events, metrics)
- Azure SQL (metadata and non-sensitive configuration)
- Azure Storage (blobs, tables, queues)
- Backups and platform logs
Usage data is held in memory only during processing before being securely persisted.
# Identity, Authentication & Access Control
# User Authentication
- User access is managed via Auth0
- Modern authentication standards (OIDC / OAuth)
- Role-based access control within the application
# Platform & Service Authentication
- Azure AD Managed Identities are used for service-to-service authentication
- No secrets are stored in application code
- Azure AD security groups enforce least-privilege access
This ensures:
- Strong identity boundaries
- Revocable and auditable permissions
- Reduced credential exposure
# Secrets & Credential Management
Sensitive credentials are securely managed using Azure Key Vault.
Stored securely:
- Cloud provider API credentials
- Connection secrets
- Platform configuration secrets
Access controls:
- Secrets are never exposed to end users
- Applications access secrets via managed identities only
- Key Vault access is restricted using Azure RBAC
# Tenant Isolation & Data Segregation
Cloud Ctrl is a multi-tenant platform with logical data segregation.
Controls include:
- Tenant-scoped metadata and usage datasets
- Access enforcement at API and query layers
- No shared credentials between tenants
- Tenant identifiers applied throughout ingestion and analysis pipelines
Customers can only access their own data.
# Monitoring, Logging & Auditability
Cloud Ctrl includes comprehensive operational visibility:
- Centralised application logging
- Platform telemetry and diagnostics
- Usage ingestion and processing statistics
- System events and audit trails
Monitoring and observability tools support:
- Incident response
- Root-cause analysis
- Compliance evidence and reporting
# Platform Reliability & Resilience
Security is reinforced by resilient platform design:
- Built-in retry policies for external APIs
- Durable, queue-based ingestion pipelines
- Health checks and heartbeat monitoring
- Automatic handling of processing spikes
Cloud Ctrl operates:
- In Azure Australia
- In a separate standalone Azure China environment for regional partners
# Secure Development & Operations
Cloud Ctrl follows DevSecOps best practices:
- Source control, CI/CD, and deployments via Azure DevOps
- Automated deployments to reduce configuration drift
- Centralised configuration management
- Auditable change management processes
# Shared Responsibility Model
Cloud Ctrl operates under a shared responsibility model.
| Area | Cloud Ctrl | Customer |
|---|---|---|
| Platform infrastructure | Yes | No |
| Data encryption | Yes | No |
| Platform access controls | Yes | No |
| User account management | No | Yes |
| Cloud account permissions | No | Yes |
Customers retain full control over:
- Permissions granted to Cloud Ctrl
- Connected cloud providers
- User access within their tenant
# Security Transparency
Cloud Ctrl is designed to support:
- Customer security reviews
- Partner audits
- Enterprise procurement requirements
Additional security documentation and architecture details are available on request.