At Aether, safeguarding customer data and intellectual property is our top priority. We are committed to building a secure, resilient platform. Our approach is grounded in industry best practices and continuous improvement to ensure robust protection across our cloud infrastructure and AI solutions.
Robust Cloud Security Framework
Aether’s security framework is designed to protect data, infrastructure, and applications through strong security principles:
AWS-Based Secure Infrastructure:
Aether’s platform is hosted on Amazon Web Services (AWS), benefiting from AWS’s multi-layered security controls, compliance certifications (ISO 27001, SOC 2, PCI-DSS, etc.), and global infrastructure protection. AWS maintains world-class data centre security, including biometric access controls, 24/7 surveillance, and environmental safeguards.
Data Encryption and Key Management:
All data is encrypted in transit (TLS 1.2/1.3) and at rest (AES-256). We utilise AWS Key Management Service (KMS) to securely manage encryption keys and follow strict access control policies.
Identity and Access Management (IAM):
We enforce role-based access control (RBAC), multi-factor authentication (MFA), and the principle of least privilege to ensure only authorised personnel have access to critical systems.
Security Monitoring and Threat Detection:
Our infrastructure integrates AWS GuardDuty, AWS CloudTrail, AWS Config, and AWS Security Hub to monitor access logs, detect anomalies, and prevent potential security threats.
Network Security and Isolation:
We implement Virtual Private Clouds (VPCs), private subnets, security groups, and Web Application Firewalls (AWS WAF) to segregate traffic and prevent unauthorised access to production systems.
Physical and Environmental Security
Since Aether operates exclusively on AWS, we inherit AWS’s world-class physical security controls for all production infrastructure. This includes:
Highly Secure AWS Data Centers:
AWS facilities are protected with biometric access controls, 24/7 on-site security, and multiple layers of redundancy (power, cooling, and connectivity) to ensure high availability.
Compliance with Global Standards:
AWS data centers meet the highest compliance certifications, including ISO 27001, SOC 2, PCI DSS, and FedRAMP, ensuring enterprise-grade security for all hosted applications.
Data Privacy and Compliance
Aether is committed to protecting customer data in full compliance with New Zealand’s Privacy Act 2020 and applicable Australian data protection laws.
Customer Data Ownership:
Customers retain full control of their data. We never use customer data for training AI models or any purpose beyond agreed services.
Data Minimisation & Secure Processing:
Aether follows the principle of data minimisation, ensuring we only collect and process the necessary data for service delivery, all secured via encrypted communications.
Third-Party Vendor Security:
Any external vendors must meet strict security and compliance requirements, including contractual data protection obligations.
Hosting Information
All hosting is located in AWS's Sydney data centre, ensuring compliance with regional regulations and providing a secure and resilient infrastructure.
Aether Entities and Role-Based Access Control (RBAC)
Entities:
Account – The top-level entity that contains multiple teams. The account entity also serves as the billing entity.
Teams – Sub-groups within the organisation, each with its own data and users.
Users – Individuals assigned specific roles within teams or at the account level.
Roles and Permissions:
Role | Data Access Scope | Permissions & Management Capabilities |
Team Viewer | Only their assigned team’s data | Can view only (unable to create or edit outputs). |
Team User | Only their assigned team’s data | Can view and work with data only for their assigned team.
No management permissions. |
Team Admin | Their team’s data | Has full access to data within that specific team.
Can manage users within their team (e.g., invite/remove members, change roles). |
Account Admin | All teams’ data | Can manage all users, teams, and account-wide settings. |
Responsible AI Practices
Aether is committed to transparent, ethical, and secure AI:
No Training on Customer Data:
Aether does not use customer data to train AI models. Instead, we rely on publicly available or internally generated datasets.
Explainable and Accountable AI:
Our AI models are designed to provide auditable, transparent insights while minimising bias.
Business Continuity and Disaster Recovery
Aether ensures operational resilience through:
Automated Data Backups & Recovery:
Daily encrypted backups are stored in AWS S3 with versioning and tested for recoverability.
Incident Response & Threat Mitigation:
Aether has a documented incident response plan, including real-time monitoring, rapid containment, and post-incident analysis.
Continuous Improvement and Security Roadmap
Security is an ongoing process. Aether is continuously enhancing our security posture by:
SOC 2 Certification Goal:
We are working toward SOC 2 compliance as part of our security maturity roadmap.
Customer-Centric Security Engagement:
We actively collaborate with enterprise customers to align with their security and compliance expectations.
Aether is committed to delivering a secure, enterprise-ready AI-powered platform that prioritises trust, security, and data privacy.