A. TLS Cipher Examples
| TLS Version | Preferred Ciphers |
|---|---|
| TLS 1.3 | TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, TLS_AES_128_GCM_SHA256 |
| TLS 1.2 | ECDHE-ECDSA-AES256-GCM-SHA384, ECDHE-RSA-AES256-GCM-SHA384 |
A layered, defense-in-depth approach across infrastructure, application, data, and operations—so your voice, telephony, and AI workloads stay protected.
Viantrix follows a security-by-design philosophy: minimize data, isolate tenants, encrypt broadly, authenticate strongly, and monitor continuously. Our controls are mapped to industry frameworks to support enterprise risk and compliance requirements.
| Control Area | Default | Description |
|---|---|---|
| Tenant Isolation | Logical isolation | Per-tenant namespaces and scoped credentials; optional dedicated VPC on request (Enterprise). |
| Secrets | KMS-managed | Secrets stored in cloud KMS/HSM-backed managers; rotated and access-controlled via IAM. |
| Supply Chain | SBOM tracked | Dependency scanning with CI gates; provenance captured; container image signing. |
| Environments | Strict separation | Prod/stage/test networks and accounts segregated; no test data in prod and vice versa. |
| Aspect | Default | Notes |
|---|---|---|
| In Transit | TLS 1.2+ (1.3 preferred) | Strict HTTPS; modern ciphers; HSTS on managed domains. |
| At Rest | AES-256 | Platform-managed encryption for databases, object storage, and backups. |
| Key Mgmt | Cloud KMS | Keys rotated per policy; customer-managed keys (CMK) available on Enterprise tiers. |
| PII Redaction | Optional | Transcript masking and selective field redaction configurable per project. |
| Retention | Configurable | Per-data-type retention windows; override in Console; align with Privacy policy. |
TLS 1.2 or higher required; TLS 1.3 preferred. Weak ciphers disabled. HSTS enabled for managed domains.
| Control | Status | Details |
|---|---|---|
| Perimeter | WAF & CDN | Managed WAF, TLS termination, bot filtering, DDoS absorption. |
| Segmentation | VPC + SG | Strict SG/NSG rules; private subnets for data planes; admin planes isolated. |
| Patching | Automated | OS and managed services patched per vendor SLAs; images rebuilt regularly. |
| Endpoints | Hardened | Minimal packages, read-only FS where possible, reduced attack surface. |
| Item | Default | Notes |
|---|---|---|
| Backups | Daily + PITR | Encrypted; restore tests performed periodically; object versioning enabled. |
| Retention | 35 days | Adjustable per tenant for certain data types. |
| RPO / RTO | ≤ 15m / ≤ 4h | Targets under typical failure scenarios; may vary by region/tier. |
| Regional Redundancy | Multi-AZ | Multi-zone HA; optional multi-region DR for Enterprise. |
| Framework | Status | Notes |
|---|---|---|
| SOC 2 Type II | Planned/Available* | Report availability under NDA where completed. Scope: Security/Availability/Confidentiality. |
| ISO/IEC 27001 | Planned/Available* | ISMS aligned controls; certificate provided upon request where applicable. |
| GDPR / DPDP / CCPA | Aligned | See Privacy Policy for roles, rights, transfers, and retention controls. |
| HIPAA (BAA) | Enterprise | Available for eligible deployments and features; contact sales/security. |
| *Exact status depends on product scope and region; contact security@viantrix.com. | ||
Project-level regional hosting (e.g., India/EU/US) may be available. Telephony traffic can traverse interconnects outside the hosting region due to carrier routing. Residency choices influence storage and processing locations for voice audio, transcripts, CDRs, and logs.
1) Detect & Triage → 2) Contain → 3) Eradicate → 4) Recover → 5) Notify (per law/contract) → 6) Postmortem & Hardening.
Customers are notified of material incidents per contractual SLAs and applicable law. Post-incident reports are shared under NDA where appropriate.
| Service | Target SLA | Notes |
|---|---|---|
| Core API & Console | 99.95% | Monthly measured; maintenance windows announced on Status page. |
| Telephony Gateway | Carrier-grade | Multi-zone; dependent on upstream carriers and regional regulations. |
Live status: https://status.viantrix.com
Security team:
security@viantrix.com
PGP:
Download key
(fingerprint posted on status page).
Responsible disclosure appreciated. Private bug bounty available
for invited researchers.
| TLS Version | Preferred Ciphers |
|---|---|
| TLS 1.3 | TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, TLS_AES_128_GCM_SHA256 |
| TLS 1.2 | ECDHE-ECDSA-AES256-GCM-SHA384, ECDHE-RSA-AES256-GCM-SHA384 |
Egress IPs and port requirements vary by region and carrier. The authoritative list is maintained on the Status/Networking page.
Allow https(443) to *.viantrix.com and region endpoints; SIP/TLS and RTP ports as per carrier interop guide.
This security overview is informational and may be adjusted per deployment. For attestations and signed docs, contact our security team.