Skip to main content

Data Privacy Platform AWS Deployment Guide

Architecture

This section describes the architecture of the Privitar AWS deployment together with information about the security implications of deploying AWS in your AWS Cloud environment.

Deployment architecture

The following diagram shows the overall architecture of the Privitar AWS Deployment and the associated AWS services that it uses:

aws_deployment_architecture_new.png

The following table describes the AWS services that are used in the deployment:

Service

Description

Application Load Balancer and Network Load Balancer

Route traffic from the Internet to services, and between services.

Web Application Firewall

Blocks known malicious entities and provides rate limiting.

API Gateway

Terminate mutual TLS.

Elastic Container Service with Fargate

Host the applications that comprise Privitar AWS.

Relational Database Service

Store configuration and state for the applications that comprise Privitar AWS.

Secrets Manager

Store sensitive infrastructure information. For example, the configuration database (ConfigDB) password, the SAML secret, JSON web token (JWT) secret, Privitar NOVLT secret, watermarking secrets, and any others.

Simple Queue Service and Simple Notification Service

Route instrumentation telemetry data from Privitar Policy Manager and Glue execution environments to the Privitar Event Broker.

Elastic File System

Store event broker instrumentation logs, prior to shipping.

Lambda

Ship instrumentation logs and performs other small tasks. For example, key rolling.

Glue

Infer from Glue Schema.

Execute Privitar jobs in Glue ETL.

DynamoDB

Store Privitar consistent tokenization mappings. This is referred to as the Token Vault.

S3

Store state, Glue ETL binaries, data, and logs.

VPC networking

Core infrastructure for the network layer, including NAT gateway, internet gateway, VPC, subnets, security groups.

Key Management System (KMS)

Encryption keys for resources created as part of this deployment.

Deployment Security

There are certain security implications that you need to be aware of when deploying Privitar AWS.

Internet-facing components

The deployment contains internet facing components. This means that:

  • A Route53 registered domain and public hosted zone is required. This means that the domain name and certificates are public.

  • The AWS Application Load Balancer that the Route53 DNS A record points to is internet-facing.

  • The optional mutual TLS enabled AWS API Gateway is internet-facing.

AWS Glue

Glue jobs created by Privitar AWS currently run inside the AWS managed networks, and not inside customer owned VPCs. It should be noted that AWS managed networks have outbound internet access.