Deliver digital products in the fastest time possible while keeping your sensitive data safe, secure, and available—24x7 through fully-managed infrastructure security controls.
Remove the work of architecting your infrastructure for secure development, and abstract away the drudgery of constantly scanning and remediating your host and network for vulnerabilities with Aptible’s built-in and fully managed network and host vulnerability management.
01
Managed Kernel Patching
The Aptible Security Team patches kernel vulnerabilities and other host- and network-level issues on your behalf.
02
Host Hardening
Aptible host operating systems are hardened to disable unnecessary services and limit surface area for attacks.
03
Managed Host Vulnerability Scans
The Aptible Security Team scans a master reference stack each month and remediates adverse findings on your behalf.
04
Docker Image Vulnerability Scans
The Aptible Platform proactively scans your Docker images for vulnerable system packages and alerts you of any addressable vulnerabilities.
Develop and launch applications in a network that’s fully protected through a series of mechanisms and controls thoughtfully implemented for defense-in-depth network security.
01
Secure Network Architecture
Network access to public-facing EC2 instances is configured via Security Group rules that are reviewed and enforced by the Aptible Security Team on a regular basis.
02
Segregation of Networks
Your infrastructure on Aptible is isolated to its own private VPC and is not directly accessible by the Internet.
03
DDoS Protection
Aptible network architecture ensures that the EC2 instances running your applications are not accessible from the Internet, and cannot be targeted directly by a DDoS attack.
04
Endpoint IP Filtering
Aptible makes it easy to restrict access to your apps and databases to a set of whitelisted IP addresses or networks, and block other incoming traffic.
05
Managed VPNs
Aptible can help you integrate with partners or connect privately to your Aptible dedicated stacks using Managed IPsec VPNs.
06
VPC Peering
Connect your Aptible dedicated stack to other AWS VPCs in the same region.
Aptible minimizes access issues by simplifying access management of your infrastructure.
01
Simplified Identity and Access Management (IAM)
Aptible simplifies infrastructure identity and access management by providing simple role-based permissioning to your stack.
02
Multi-factor Authentication
Aptible supports protecting your accounts with both token-based 2FA or FIDO U2F security keys.
03
Single Sign-on
Seamlessly manage your team's access to your Aptible account by enrolling Aptible with your SSO provider.
See how using Aptible can help get your product to market faster without compromising on security.
Aptible's Security Team monitors your infrastructure for and responds to potential threats so you don't have to and your team's operational and SSH activity is streamed to your logging service for additional analysis.
01
Managed Host Intrusion Detection
The Aptible Security Team monitors the underlying EC2 instances in your stack for potential intrusions and responds on your behalf 24/7.
02
SSH Session Logging
Aptible captures and routes SSH session activity to your logging provider for additional auditing an analysis.
03
Platform Activity Logging
The Aptible Security Team monitors the underlying EC2 instances in your stack for potential intrusions and responds on your behalf 24/7.
04
Configuration Drift Protection
Aptible ensures that the configuration of your environment is hardened to avoid unintentional or unapproved configuration changes.
See how using Aptible can help get your product to market faster without compromising on security.
Have the confidence to quickly develop and launch secure apps and databases with a world-class team of reliability and security engineers offering you support along the way, all the while constantly scanning and remediating any issues in the underlying infrastructure on your behalf.