Article

Swirl Security Overview Pt. 3 - Securely deploying Swirl in Azure

This is the third blog in the series where we will be checking in with the best practices to deploy Swirl. Swirl's Azure-hosted Architecture and Security...

← Back to Blog

This is the third blog in the series where we will be checking in with the best practices to deploy Swirl.

Swirl's Azure-hosted Architecture and Security Commitment


The diagram above showcases the standard layout for Swirl when hosted in Azure. All offerings hosted by Swirl strictly adhere to the following:

Delving Deeper into Swirl's Security Framework

As we progress through this article, we aim to shed light on:

As we dive deep into the deployment best practices, I suggest you check the previous two articles in the series.

https://8ph.795.myftpupload.com/swirl-security-overview/
First blog in this series, Swirl Security Overview Pt. 1
https://8ph.795.myftpupload.com/swirl-security-overview-pt-2/
Second part of the series, Swirl Security Overview Pt. 2

Delving Deeper into Swirl's Security Framework

1. Basic Configuration for Production Use:

2. Enhancing Performance with a Reverse Proxy:

Swirl suggests using a reverse proxy. Why? It:

3. Optional Configuration for Advanced Users:

If you're looking to customise further, you can configure the reverse proxy to redirect incoming traffic from the standard port 443 to Swirl's internal application server on port 8000.

Guide to Logging for Compliance & KYC with Swirl

1. Why Log User Activity?

2. How to Log User Activity?

You have two main options:

Customise Your Logging Format:

Analyse the Swirl Database Directly:


Thank you for exploring Swirl's Security Overview with us!
Now, after this guide, you can: