Production data isolation
Last updated: Mar 24, 2026
Fluid Attacks has preventive measures that prevent production data from being used for test and development environments:
- All production data is stored in the cloud.
- People working on development projects cannot see or change the data stored in the cloud.
- In development environments, mock data is used for testing.
To make sure that the development role does not have access to the production data, Fluid Attacks regularly checks the Terraform code that defines the permissions of that role.
Regarding the mock data used for testing, it is determined in the following URLs:
Other integrity measures
Monitoring
Fluid Attacks monitors its infrastructure using AWS CloudWatch, GuardDuty, Inspector, and Datadog for log management, threat detection, and Cloud SIEM.
Secure emails
Fluid Attacks secures its email domain with several protocols to help recipients verify message authenticity and prevent phishing.