Installation & Deployment Guidance

Deploy CyberTax Across AWS, On-Prem, or Hybrid Environments

This guide summarizes infrastructure minimums, environment dependencies, identity setup, AI integration, and secure deployment patterns for CyberTax operations.

High-Level Installation Guide

  1. Provision PostgreSQL, Redis, and artifact storage according to target security boundary.
  2. Configure environment variables and secrets for backend, worker, and frontend services.
  3. Deploy with container orchestration using the provided compose baseline and hardened ingress.
  4. Configure identity providers in the Administration area (SAML, OIDC, or LDAP).
  5. Enable Bedrock model access and verify AI scoring and report generation workflows.

Minimum Infrastructure Requirements

Deployment ProfileApp CPUApp MemoryDatabase BaselineNotes
Pilot / Single System4 vCPU8 GB RAMPostgreSQL 16 (2 vCPU, 4 GB RAM)Suitable for limited concurrent assessor and ISSO/ISSM activity.
Program Office / Multi-System8-16 vCPU16-32 GB RAMPostgreSQL 16 (4+ vCPU, 8+ GB RAM, managed recommended)Supports broader multi-tenant and report generation workloads.
SAP / Controlled Environment16+ vCPU32+ GB RAMPostgreSQL 16 HA topology with backup controlsDesigned for higher-assurance workflows and controlled operations.

AWS Deployment

Use ECS/EKS with managed Postgres (RDS/Aurora), Redis, and S3-backed artifact storage. Terminate TLS at ALB/NLB + NGINX edge pattern.

On-Prem Deployment

Run containers in a segmented enclave with internal Postgres/Redis services, enterprise IdP integration, and controlled artifact storage volumes.

Hybrid Deployment

Keep application stack in cloud while integrating on-prem identity, logging, and governance systems through controlled network boundaries.

Required External Dependencies

Core Platform Dependencies

  • Relational database: PostgreSQL 16 baseline.
  • Queue/cache service: Redis 7 baseline for worker execution.
  • Artifact storage: local volume for development, S3-compatible object storage for production.

Identity & Access Dependencies

  • Identity provider integration via OIDC, SAML, or LDAP.
  • TLS termination and certificate management for all user/API ingress.
  • Least-privilege IAM for Bedrock invocation and artifact storage access.

Identity Provider Configuration (SAML / OIDC / LDAP)

OIDC

  1. Create an OIDC application in your IdP.
  2. Register redirect URIs exposed by CyberTax.
  3. Set issuer URL, client ID, and secret reference in Admin - Identity Providers.

SAML

  1. Import SAML metadata URL or XML in Admin - Identity Providers.
  2. Verify entity ID, ACS URL, and IdP SSO URL mapping.
  3. Configure signing/encryption certificate references and test connection.

LDAP

  1. Set LDAP URL, base DN, bind DN, and secret reference.
  2. Define user/group filters and attribute mapping.
  3. Enable StartTLS where required and validate connectivity.

AWS Bedrock Integration Guidance

Bedrock integration requires model access enablement, least-privilege IAM policy assignment, and runtime environment configuration.

# Backend environment baseline
BEDROCK_MODEL_ID=anthropic.claude-3-sonnet-20240229-v1:0
AWS_REGION=us-east-1
STORAGE_BACKEND=s3
S3_BUCKET=your-cybertax-artifacts

Use the baseline policy template at deploy/iam-bedrock-policy.json and validate model invocation permissions before enabling production scoring.

Helm Chart Guidance Reference

For Kubernetes deployments, use the CyberTax Helm release package provided with your environment baseline and align values with the same configuration keys used by the compose deployment profile.

# Example deployment flow (adjust chart path/repo for your release package)
helm upgrade --install cybertax ./charts/cybertax \
  --namespace cybertax \
  --create-namespace \
  --set image.tag=<release-tag> \
  --set env.AWS_REGION=<region> \
  --set env.BEDROCK_MODEL_ID=<model-id>

Validate ingress, secret references, and storage classes against your enclave policy before promoting a Helm release to production.

Security Architecture & Data Protection

Security Architecture Overview

  • HTTPS-only ingress with TLS 1.2+ and HSTS controls.
  • Role and tenant-scoped authorization across API resources.
  • Administrative audit logging and authentication event tracking.

Storage & Encryption Practices

  • Data in transit protected through TLS at edge and API layers.
  • Artifact encryption at rest via object storage server-side encryption policies.
  • Database-at-rest encryption handled by platform-managed controls (for managed DB deployments).

Recommended Deployment Architecture

Version Compatibility Matrix

ComponentSupported / Baseline VersionSource
Python Runtime3.12.xbackend Dockerfile base image
Node Runtime20.xfrontend Dockerfile base image
PostgreSQL16.xdocker-compose production baseline
Redis7.xdocker-compose worker queue baseline
FastAPI + SQLAlchemyCurrent project dependenciesbackend/requirements.txt
Next.js16.xfrontend build output baseline