Network Security

Network isolation

Rockhopper's infrastructure follows strict network segmentation principles:

  • Environment separation — Production and staging environments are isolated in separate VPCs. No cross-environment access is permitted.

  • Minimal exposure — Each component has its own firewall rules, exposing only the ports and protocols required for its function.

  • Private subnets — Databases, background processors, and internal services are placed in private subnets with no direct internet access. Only the API server and web application are internet-facing.

TLS enforcement

All internet-facing connections require TLS 1.2 or higher:

  • Client-to-server traffic uses HTTPS exclusively

  • WebSocket connections use WSS (encrypted WebSocket)

  • Internal service-to-service communication follows AWS security group rules within the VPC

  • Unencrypted HTTP requests are automatically redirected to HTTPS

Web Application Firewall

A WAF is deployed across the entire cloud footprint, providing protection against:

  • Injection attacks — SQL injection, cross-site scripting (XSS), and other common web exploits

  • Volumetric attacks — DDoS mitigation and rate limiting

  • Malicious patterns — Automated scanning and known attack signatures

Last updated