Skip to main content

Case Studies

Empowering SecureG’s Market Expansion: Delivering a Highly Scalable Signing Solution on AWS Capable of Handling 30,000 Requests per Second

July 8, 2024      

About the Client

SecureG is a leading cybersecurity company that offers cutting-edge, certificate-based security solutions for critical infrastructure in both the private and public sectors. Their PKI technology provides government-compliant security at scale with low latency, enabling supply chain-aware Zero Trust Architecture (ZTA).  

SecureG’s solutions cater to the security requirements of technologies such as IoT, OT, 5G networks, and Industry 4.0. They also offer secure key signing services for various industries, including VoIP, telephony, and solar manufacturing, ensuring secure communication and authentication across a wide range of applications. 

The Challenge

SecureG faced the complex challenge of implementing the ATIS-82 specification for cryptographically signing VoIP calls while establishing robust operational capabilities across their infrastructure. Their existing IT infrastructure, hosted in a traditional data center, utilized a mix of VMware virtual machines and physical servers, leading to resource allocation issues. This static setup prevented demand-based scaling, resulting in unnecessary costs during off-peak hours and performance issues during busy periods. 

Beyond the technical performance requirements, SecureG faced significant operational challenges in managing their mission-critical infrastructure. Their mission to maintain strict sub-50ms latency SLAs required comprehensive observability across their modern containerized and serverless architecture. The company also faced complex compliance requirements spanning SOC 2, WebTrust, and NIST 800-53 standards, with no automated way to enforce and validate security controls. 

The migration needed to be completed within a three-month window to align with their SOC 2 compliance audit schedule. Manual configuration management processes across multiple AWS accounts and environments created operational inefficiencies and security risks. Additionally, they needed to develop a standardized approach for patch management and vulnerability remediation across their hybrid infrastructure, and limited visibility into system performance and security metrics hampered their ability to proactively identify and resolve issues. 

The Solution

We implemented a comprehensive CloudOps framework that enabled the delivery of a high-performance API solution. At the infrastructure level, we developed a custom API implementation using Go, deployed on AWS ECS with Fargate across multiple geographic regions, leveraging ElastiCache with Redis, Route 53, and SQS to achieve high performance and efficient geo-routing. 

The solution was built on three operational pillars: 

  • Configuration and Operations Management: Deployed Terraform-managed AWS Organizations with separate OUs for security, networking, and workload management. This includes automated configuration management through infrastructure-as-code with centralized state management and security-focused pull request workflows. Established automated patch management using AWS Systems Manager for Windows servers and container update workflows for ECS workloads, complemented by standardized tagging policies managed through Terraform for consistent resource tracking and cost allocation.
  • Monitoring and Observability: Implemented comprehensive container and Lambda observability using Datadog, with focus on critical SLA metrics including latency, throughput, and error rates. Deployed custom health check endpoints and ALB metrics to track system availability and performance. Established KPI monitoring for business-critical metrics with automated scaling policies based on observed metrics to maintain performance targets. 
  • Security and Compliance: Integrated Datadog CSPM for real-time configuration compliance monitoring against CIS benchmarks and implemented CloudSIEM for centralized security monitoring of OS and CloudTrail events. Established automated vulnerability management with integrated PagerDuty alerts for critical findings, while implementing automated controls through SCPs and AWS Config rules to enforce security standards. 

AWS Services Used

  • Amazon Elastic Container Service (ECS) with Fargate
  • Amazon ElastiCache (Redis) 
  • Amazon Route 53 
  • Amazon Elastic Compute Cloud (Amazon EC2)
  • Amazon Simple Queue Service (SQS) 
  • AWS Fargate 
  • AWS Secrets Manager 

The Results

The solution delivered exceptional results across both technical performance and operational metrics. The system achieved sub-20ms latency (60% better than target) and handled 30,000 requests per second (10x initial target), with the capability to scale to millions of calls per second through efficient vertical and horizontal scaling mechanisms. 

From an operational perspective, we automated validation of 100% of CIS benchmark controls through Datadog CSPM and reduced critical vulnerability remediation time from days to hours with integrated alerting. The company successfully completed their SOC 2 audit with zero findings related to AWS infrastructure. Configuration drift incidents were reduced by 90% through automated compliance monitoring, while the average time for environment provisioning decreased from days to hours using infrastructure as code. 

The robust operational framework enabled rapid delivery, with the proof-of-concept completed in 1.5 months and full production build in 2 weeks. This speed of delivery, combined with the system’s versatility in both on-site and cloud deployments, provided SecureG with a significant competitive advantage and expanded their market reach. We automated 95% of routine operational tasks through configured workflows, enabling the team to focus on continuous improvement rather than maintenance.