Infrastructure
Three copies.
Two clouds.
Zero guesswork.
Every security control we use is documented, tested, and explained in plain language. AES-256 encryption, 3-2-1 redundancy across AWS and Google Cloud, and weekly automated integrity checks on every account.
3-2-1 Redundancy
Three copies. Two providers. One local.
The 3-2-1 backup rule is an industry-standard architecture endorsed by NIST and used by enterprise storage operations worldwide. We implement it for every client regardless of tier.
Local copy syncs nightly to both cloud providers via encrypted Rclone. AWS replicates to a second region automatically.
Security Concepts
What every security term actually means
We use industry-standard terminology because it is precise and auditable. Here is exactly what each term means for your data.
AES-256 (Advanced Encryption Standard with a 256-bit key) is the same encryption standard used by the U.S. federal government for classified information. When your data is stored on disk in any of our cloud buckets, it is transformed into ciphertext that is unreadable without the encryption key. Only authorized processes and personnel can access the plaintext.
Applied to all tiersTransport Layer Security ensures that data moving between your systems and our cloud storage cannot be intercepted or read in transit. All connections to AWS S3 and Google Cloud Storage are enforced over TLS. Any connection attempt over an unencrypted channel is rejected at the network layer.
Enforced at network layerAWS offers two models of server-side encryption. SSE-S3 uses AWS-managed keys and is applied by default. SSE-KMS uses AWS Key Management Service with customer-managed keys, giving you explicit control over key rotation and access policy. HIPAA-tier clients receive SSE-KMS so all key usage is logged and auditable.
HIPAA tier uses KMSAWS S3 versioning preserves every version of every object in your bucket. If a file is modified, overwritten, or accidentally deleted, the previous version remains intact and retrievable. This protects against ransomware that attempts to overwrite files and against accidental deletion by any party.
Enabled on all primary bucketsAWS Identity and Access Management controls who can access what within your storage account. Each client receives a dedicated IAM user scoped exclusively to their bucket with no cross-account permissions possible. Policies define the minimum necessary access required for operations, and multi-factor authentication is required for all privileged actions.
Scoped per clientMulti-factor authentication requires a second form of verification beyond a password before access is granted. We enforce MFA on every IAM user associated with your account. Even if a password were compromised, access to your storage buckets would remain protected by the second factor.
Required on every accountAWS S3 access logging records every request made to your bucket: who accessed it, when, from which IP address, and what action was taken. These logs are written to a separate isolated bucket and are retained as part of your audit trail. They are available for compliance reviews, dispute resolution, or security investigations.
Business and aboveRclone crypt wraps any cloud storage remote with an additional encryption layer applied before data leaves your local environment. Files are encrypted on the operator machine before upload, meaning neither AWS nor Google Cloud ever sees plaintext data. The encryption key never leaves the Stoneline environment and is stored in a hardware-secured password vault.
Available on all tiersAWS CloudWatch monitors your storage buckets for unusual activity patterns: unexpected large deletions, access from unfamiliar IP ranges, or volume spikes that deviate from your baseline. Alerts are configured to notify the Stoneline operator immediately, enabling rapid investigation and response before an incident affects your data.
Small Business and aboveIntegrity verification compares the cryptographic checksums of files in your local copy against the checksums of your cloud copies. If any file has been silently corrupted, truncated, or altered in transit, the mismatch is detected. We run weekly checks on active plans and quarterly checks on cold archives, and report results in your monthly verification document.
All tiers, automatedA retention policy defines how long data must be kept before it can be deleted. For regulated clients, this may be mandated by law: HIPAA requires medical records to be retained for a minimum of six years from creation or from the last date of service. We document and enforce your retention schedule and prevent deletion until the required period has elapsed.
Legal and HIPAA tiersAmazon S3 Glacier is a long-term archival storage class designed for data that needs to be preserved but is rarely accessed. Storage costs are significantly lower than S3 Standard. We automatically transition replica bucket objects to Glacier after 30 days, reducing ongoing costs for clients with large or growing archives while maintaining full redundancy.
Cold Archive and replica bucketsHow It Works
What happens at every step
From initial onboarding to monthly verification, here is the documented process that runs on your account.
A dedicated IAM user and S3 bucket are created in your name. The bucket blocks all public access, versioning is enabled, and default encryption is applied. A matching GCP project and service account are created and scoped to your storage bucket only. No shared infrastructure.
Server-side encryption is enabled at the bucket level. For HIPAA-tier clients, AWS KMS customer-managed keys are configured with a dedicated key per client. Rclone crypt is configured for client-side encryption before upload, so plaintext never reaches the cloud provider.
Rclone syncs your local data to both AWS and GCP nightly at 2:00 AM. A dry-run is performed first to detect anomalies before any live transfer. Logs from every sync pass are written to your client folder and stored for 90 days.
Your primary AWS bucket in us-east-1 automatically replicates to a replica bucket in us-west-2. This replication is managed by AWS and runs continuously. Replica objects transition to S3 Glacier after 30 days to reduce long-term storage cost.
Every Sunday, Rclone compares the checksums of your local copy against your cloud copies and logs any discrepancies. A clean check means your three copies are identical. Any mismatch triggers immediate investigation and resolution before your monthly report is issued.
At the end of each month you receive a plain-language written report confirming: last successful sync date for AWS and GCP, storage used versus allocated, integrity check result for the month, any alerts raised and how they were resolved, and current bucket encryption status. This report is suitable for compliance documentation.