Hyper Anna provides a multi-tenanted, cloud-based, SaaS solution, where multiple
clients share the same underlying infrastructure. Ensuring that data remains
separated across clients is of utmost importance.
This document describes the different layers of security and segregation we employ
to keep data safely compartmentalised.
User Access Model
Application-level segregation is achieved through Hyper Anna’s own user
management system, including a hierarchical user access model that manage
Organisations, Groups and Users, which effectively achieved logical segregation
Organisations may be an individual company or a business unit within a larger
company. All resources in our system, including Group, Users and Datasets must
belong to a single organisation and can not be moved to a different organisation
Groups link user(s) to dataset(s) under the same Organisation. Each group could
have multiple users and contains permission to access multiple datasets with
extensive access control, under the same organisation. In addition, each group can
be configured to have different permission levels, see this link for more information
on the permission levels.
Users can have different permission levels to different datasets by being part of
different groups. No user can share datasets between organisations.
Multiple controls are in place during the software development lifecycle to ensure
the user access model is adhered to. This includes (but is not limited to) code
reviews, high-level architectural reviews and targeted security reviews. Additionally,
all Hyper Anna software engineers receive training on secure coding practices.
User authentication in the application is done using a JWT token. Thus, all datasets
are segregated from a user authorisation point of view.
Customer data in Hyper Anna can be classified into two categories: Metadata and
Source data. Source data is the raw data that was uploaded or imported into
Anna by users. Metadata is information about that data that are derived by Hyper
Anna algorithms, which may include results of calculations and analysis.
Source data is stored on encrypted disks in Microsoft’s Azure cloud. Each
imported dataset is segregated on disk by directory structure. Access to each
directory structure is controlled based on user permissions.
Metadata is stored in an Azure managed MySQL instance. The table schema
follows the logical model described in the preceding section, metadata is keyed to
an organisation. All metadata is encrypted at rest inside the MySQL database.
Networks are physically & logically segregated to separate the development
environment from the production environment. User data is physically not
accessible outside of the production environment.
The production network is partitioned, so the internal network is isolated from the
public-facing application server.
Azure Network Security Group are used to implement Access Control List
whitelisting for required ports only.
Inbound connections are only allowed from a load balancer and VPN and All
outbound internet connections go through NAT.
Reverse Proxies are used to isolate the server and client.
If you have any questions, please contact us at email@example.com.