🚀
sherpa.sh docs
HomeInfrastructureAboutPricingDocsSign Up
  • Getting Started
    • What is sherpa.sh?
    • Getting Started
    • App Configuration
    • Custom Domains
    • Regions
  • TRAINING
    • Video Courses
      • Lesson 1: Deploying your first application
  • Applications
    • Supported Frameworks
      • Sveltekit
      • Next.js
      • React
      • Payload CMS
      • Docker
      • Custom Setups
    • Supported AI Website Builders
    • Continuous Delivery
    • CDN & Caching
  • Promotions & Rollbacks
  • Debugging
  • Securing your Application
  • Databases
    • Managed Databases
      • Postgres
      • MySQL
      • MongoDB
  • Architecture
    • Architecture Overview
      • Next.js Architecture
    • Compliance
  • Integration Help
    • Clerk
  • Zero Downtime Migration
  • CHANGELOG
    • v0.4.0 - 22/5/25
    • v0.3.2 - 4/5/25
    • v0.3.1 - 22/4/25
    • v0.3.0 - 9/04/25
    • v0.2.0 - 27/03/25
    • v0.1.0 - 21/03/25
Powered by GitBook
On this page
  • Infrastructure Selection
  • High Availability Architecture
  • Our Security Journey
  1. Architecture

Compliance

We prioritize building trust through transparency, rigorous standards, and partnerships with industry-leading infrastructure providers. Here's how we approach security and stability:

Infrastructure Selection

We partner with established cloud infrastructure providers that:

  • Maintain SOC 2 Type II, ISO 27001, and PCI DSS certifications

  • Undergo regular independent security audits and vulnerability assessments

  • Implement continuous monitoring and proactive risk management

  • Have proven track records in the industry, being in business for at least 10 years.

  • Consistent operational stability with clear incident response protocols and transparency

High Availability Architecture

Our infrastructure is designed with redundancy at every layer:

  • Multi-node Kubernetes clusters distributed across multiple availability zones.

  • At least three control planes per cluster to ensure continuous orchestration

  • Multiple provider integration to eliminate single points of failure

  • Replicated storage systems with automated failover capabilities

  • Regular automated backups of all critical infrastructure components

  • Designed for maximum uptime and rapid disaster recovery

Our Security Journey

We are actively working with TrustCloud Security Assurance platform to evolve and monitor our security processes. This partnership helps us:

  • Implement industry best practices

  • Track our security posture

  • Develop comprehensive security documentation

  • Progress toward key compliance certifications such as SOC 2 Type II.

PreviousNext.js ArchitectureNextClerk

Last updated 3 months ago

Note: If you require SOC 2 Type II or other compliance certificates for your evaluation process, please . We are a bootstrapped company and are waiting for the right customer to ask before paying for compliance certificates. We have an auditor selected and waiting.

contact our team