Skip to main content

Security built for the factory floor

Maecos runs in regulated environments where uptime, data integrity, and access control are non-negotiable. Our architecture reflects that from the ground up.

IT manager reviewing cloud infrastructure and security dashboards in a modern office overlooking a production facility

Guiding principles

Security by design

Security is integrated at every stage of development and operations, not bolted on after the fact.

Cloud-native and managed

Built on hardened, compliant, continuously maintained AWS services. No on-premise servers, no internal office network.

Tenant isolation

Every customer gets their own container and their own database. Your data is logically separated and encrypted at rest.

Compliance and governance

ISO 27001

Security controls aligned with the ISO 27001 framework. Formal InfoSec policy maintained and reviewed annually, supported by a central risk register and structured control assessments.

GDPR

GDPR rights fully supported. All customer data can be exported or deleted upon written request. DPO-style procedures in place for handling data subject requests. DPIAs conducted for major feature changes affecting personal data.

Data processing agreement

A standard DPA is available and can be signed as part of the onboarding process. A list of subprocessors is included in the DPA and available upon request. Custom DPA terms can be discussed.

Data residency

All customer data is stored and processed exclusively within the European Union (AWS eu-west-1). No data is transferred to third countries.

Internal governance

Central risk register maintained with assessments conducted for new features. All contractors sign NDAs and adhere to internal policies.

People security

Structured joiner-leaver process. Background checks and NDA requirements for all team members and contractors.

Data retention and offboarding

Customer data is retained for the duration of the contract. Upon termination, all data is exported to the customer and permanently deleted from our systems within 90 days, including backups.

Regulated environments

Maecos is deployed in GxP-regulated manufacturing environments including food, pharma, and chemicals. The platform supports audit trail requirements, controlled document workflows, and training record traceability expected in these sectors.

Infrastructure and hosting

Maecos is hosted on AWS in the EU (eu-west-1). Each customer tenant runs in its own container on ECS Fargate, with a dedicated database on an Aurora HA cluster. Separate environments for production, staging, and testing, each with its own ECS and database clusters.

Cloud provider

AWS, EU region (eu-west-1)

Compute

ECS Fargate, one container per tenant

Database

Dedicated database per customer on Aurora HA cluster

Object storage

S3 buckets per tenant, encrypted with KMS

Edge connectivity

Secure on-premise agent for IT/OT integration

CDN

CloudFront for static assets and edge delivery

Uptime and SLA

99.9% target uptime. Negotiable SLAs available on request.

Encryption and network security

All data is encrypted in transit using TLS 1.2+ and at rest using AES-256 with AWS KMS-managed keys. Tenant containers run in isolated VPCs with private subnets. There is no internal office network. All infrastructure is cloud-only.

Inbound traffic passes through AWS WAF with DDoS protection, IP rate limiting, and path filtering. Secrets are managed via AWS Secrets Manager. Infrastructure is patched automatically.

In transit TLS 1.2+
At rest AES-256 (KMS)
Network isolation Private subnets, VPC segregation
Edge protection AWS WAF, DDoS, rate limiting
Secrets AWS Secrets Manager

Identity and access control

Maecos supports enterprise identity management out of the box. Authentication integrates with your existing identity provider, and authorization is handled through fine-grained role-based access control.

Single sign-on

SAML, OIDC, Azure AD. Extensible via custom integration.

Multi-factor authentication

Available through your identity provider.

Role-based access

Over 200 permissions. Role templates for Operator, Trainer, Team Leader, LMS Admin, and more. Fully configurable per tenant.

Automated permissions

Permission assignment can be automated via LMS skill qualifications.

Session controls

Configurable session timeout. IP whitelisting possible via SSO integration.

Audit trail

All actions are logged with timestamps and user attribution: login events, role changes, checklist completions, document approvals, training records, and API calls.

Development and application security

Security is part of the development lifecycle, not a separate gate. All pull requests go through mandatory peer review covering security, functionality, and quality. Static code analysis runs in the CI pipeline, and automated dependency scanning monitors CVE coverage and license compliance continuously.

Continuous application security monitoring and penetration testing are handled externally through Aikido Security, covering vulnerability detection, DAST, and compliance posture. Combined with regular threat modelling internally. Dev and test environments never contain live customer data. Only anonymized or generated datasets are used.

Code review Mandatory peer review on all PRs
Dependency scanning Automated CVE and license scanning in CI
Static analysis Integrated in CI pipeline
Application security Continuous monitoring via Aikido Security
Test data Anonymized only, no live data

Monitoring and incident response

Full-stack observability covers logs, metrics, and traces from every container and function. Alerts are routed to on-call engineers and team channels for immediate response.

Application logging

Full audit trail including login events, role changes, and API calls. 30 days online, archived longer in encrypted S3 buckets.

Incident response

Documented incident response plan with triage, escalation, root cause analysis, and notification within 72 hours where applicable.

Backup and disaster recovery

Automated daily and monthly backups, all encrypted using AWS KMS. Restore procedures are validated yearly. The platform uses a multi-AZ failover strategy and is recoverable in alternate availability zones.

Fully cloud-native, distributed design. Operates independently of any physical office infrastructure.

Primary RPO < 1 minute
Backup RPO Up to 24 hours (fallback)
RTO Typically under 2 minutes, under 1 hour for extreme events
Failover Multi-AZ, recoverable in alternate zones

Responsible disclosure

If you discover a security vulnerability in Maecos, we want to hear about it. Please report it responsibly so we can investigate and address it before it affects customers.

Report a vulnerability

Email security@maecos.com with a description of the issue, steps to reproduce, and any supporting evidence. We will acknowledge receipt within two business days.

What we ask

Give us reasonable time to investigate and fix the issue before disclosing it publicly. Do not access or modify customer data. Do not use automated scanning tools against production systems without prior coordination.

Questions about security?

We are happy to provide deeper technical documentation or schedule a call with our team to walk through your specific requirements.