Skip to main content

Sandbox

Sandboxes

Deploy Secure Private Sandboxes for Your Workloads

Deploy applications within sandboxes that have no access to the internet—neither inbound nor outbound. Advanced techniques now allow the use of alternative protocols instead of traditional internet protocols like HTTP or TCP/IP within these secure environments. This approach is highly effective in minimizing the risk of hacking and vulnerabilities.

These sandboxes can run compute and storage workloads while remaining isolated from the internet.

Users access these environments through secure, application-aware interfaces, ensuring that no harm can be done.

Keep all data in Secure Sandbox deployments

Secure locations should be a blend of distributed and centralized facilities, designed to ensure that data is never lost or altered.

Applications within these secure sandboxes can only access data stored internally, utilizing unique storage technologies like zero-knowledge proof. No data is ever transferred to laptops or desktops.

Access is exclusively through secure browsers or other specialized access technologies, with all activities audited as necessary. Only the screen output is visible to users on their laptops, ensuring data integrity.

Key principles include:

  • No JavaScript applications running in browsers for secure government apps or data.
  • All applications requiring high security are accessed via secure remote access technologies.
  • Network communication is encrypted end-to-end with strong authentication.
  • Data remains within the sandbox, encrypted and dispersed in multiple layers by design.
  • A full history of changes is maintained with comprehensive audit trails.
  • Blockchain technology is used to enable authorized personnel to view audit trails as needed.
  • The secure sandbox must be resilient, with data mirrored across at least three locations, ensuring continuity even in the event of a disaster.