Network management and security
Browse through instructions for common Aiven platform tasks related to managing services networking configurations.
Cloud security
Learn about Aiven's access control, encryption, network security, data privacy and operator access.
Available cloud regions
A reference list of the default available cloud regions.
Availability zones
Availability zones (AZs) are physically isolated locations (data centers) where cloud services operate.
Enhanced compliance environments (ECE)
Aiven collects, manages, and operates on sensitive data that is protected by privacy and compliance rules and regulations. Aiven meets the needs of its customers by providing specialized enhanced compliance environments (ECE) that comply with many of the most common compliance requirements.
Bring your own cloud
6 items
VPCs
9 items
IP addresses
4 items
Firewall configuration for service nodes
Aiven nodes are built using Linux. Firewall configuration is managed using native Linux kernel-level iptables rules that limit connectivity to nodes.
TLS/SSL certificates
All traffic to Aiven services is always protected by TLS. It ensures that third parties can't eavesdrop or modify the data while in transit between Aiven services and the clients accessing them.
Disaster recovery testing scenarios
Disaster Recovery (DR) is the ability of software and/or services to handle extreme scenarios. For example, the failure of the software itself or a datacenter outage.