-
- Setup a Stack (Cluster)
- Setup Hosting Plans
- Setup a Site
- Apply changes from Idealstack to AWS
- Create & manage databases
- Upload files using SFTP or the web based file manager
- Viewing logs
- Troubleshooting
- Connect to your site with SSH
- Managed Security Updates
- Deleting a stack
- Setting up SES for email delivery
Security in Idealstack
It's worth delineating what level of access the Idealstack system has:
- Idealstack is a piece of software that connects to your AWS account through API's, particularly AWS cloudformation, to deploy your code
- Idealstack is providing the software images for the hosting containers, and also the configuration script for the server instances
What we don't have:
- Direct access, eg via SSH, to your systems.
- The ability to see or modify your code
- The ability to see or modify your databases and other data storage
- Idealstack deploys the AWS ECS-Optimised AMI without any modifications as it's base, so there's no opportunity for us to install 'root kits' or other low-level "hidden" compromises of the system
The main way you can have confidence in what our system does is that it does it transparently
- Firstly, because AWS operates through AWS Cloudformation, by viewing the cloudformation template you can see exactly what is being done
- You can also record and audit any of Idealstack's usage of AWS API's using https://aws.amazon.com/cloudtrail/ (to identifiy if, for example, someone took the AWS key and did something else with it )
- You can audit the hosting containers and server instance configurations because they are all running on your servers and you have full root-level access to them.
And of course we take security pretty seriously in our own development process:
- Critical information like your AWS access keys are stored encrypted using AWS KMS
- One of the main features of Idealstack is that we're handling security issues like OS Updates, AWS security rules etc in a better 'best practice' way than might be feasible for your own team to manage.