Three copies.
Two clouds.
Zero guesswork.

Every security control we use is documented, tested, and explained in plain language. AES-256 encryption, 3-2-1 redundancy across AWS and Google Cloud, and weekly automated integrity checks on every account.

Three copies. Two providers. One local.

The 3-2-1 backup rule is an industry-standard architecture endorsed by NIST and used by enterprise storage operations worldwide. We implement it for every client regardless of tier.

Local copy syncs nightly to both cloud providers via encrypted Rclone. AWS replicates to a second region automatically.

What every security term actually means

We use industry-standard terminology because it is precise and auditable. Here is exactly what each term means for your data.

AES-256
Encryption at Rest

AES-256 (Advanced Encryption Standard with a 256-bit key) is the same encryption standard used by the U.S. federal government for classified information. When your data is stored on disk in any of our cloud buckets, it is transformed into ciphertext that is unreadable without the encryption key. Only authorized processes and personnel can access the plaintext.

Applied to all tiers
TLS 1.2 / 1.3
Encryption in Transit

Transport Layer Security ensures that data moving between your systems and our cloud storage cannot be intercepted or read in transit. All connections to AWS S3 and Google Cloud Storage are enforced over TLS. Any connection attempt over an unencrypted channel is rejected at the network layer.

Enforced at network layer
SSE-S3 / SSE-KMS
Server-Side Encryption

AWS offers two models of server-side encryption. SSE-S3 uses AWS-managed keys and is applied by default. SSE-KMS uses AWS Key Management Service with customer-managed keys, giving you explicit control over key rotation and access policy. HIPAA-tier clients receive SSE-KMS so all key usage is logged and auditable.

HIPAA tier uses KMS
S3 Versioning
Version Retention

AWS S3 versioning preserves every version of every object in your bucket. If a file is modified, overwritten, or accidentally deleted, the previous version remains intact and retrievable. This protects against ransomware that attempts to overwrite files and against accidental deletion by any party.

Enabled on all primary buckets
IAM
Identity and Access Management

AWS Identity and Access Management controls who can access what within your storage account. Each client receives a dedicated IAM user scoped exclusively to their bucket with no cross-account permissions possible. Policies define the minimum necessary access required for operations, and multi-factor authentication is required for all privileged actions.

Scoped per client
MFA
Multi-Factor Authentication

Multi-factor authentication requires a second form of verification beyond a password before access is granted. We enforce MFA on every IAM user associated with your account. Even if a password were compromised, access to your storage buckets would remain protected by the second factor.

Required on every account
Access Logs
S3 Access Logging

AWS S3 access logging records every request made to your bucket: who accessed it, when, from which IP address, and what action was taken. These logs are written to a separate isolated bucket and are retained as part of your audit trail. They are available for compliance reviews, dispute resolution, or security investigations.

Business and above
Rclone Crypt
Client-Side Encryption

Rclone crypt wraps any cloud storage remote with an additional encryption layer applied before data leaves your local environment. Files are encrypted on the operator machine before upload, meaning neither AWS nor Google Cloud ever sees plaintext data. The encryption key never leaves the Stoneline environment and is stored in a hardware-secured password vault.

Available on all tiers
CloudWatch
Anomaly Monitoring

AWS CloudWatch monitors your storage buckets for unusual activity patterns: unexpected large deletions, access from unfamiliar IP ranges, or volume spikes that deviate from your baseline. Alerts are configured to notify the Stoneline operator immediately, enabling rapid investigation and response before an incident affects your data.

Small Business and above
Rclone Check
Integrity Verification

Integrity verification compares the cryptographic checksums of files in your local copy against the checksums of your cloud copies. If any file has been silently corrupted, truncated, or altered in transit, the mismatch is detected. We run weekly checks on active plans and quarterly checks on cold archives, and report results in your monthly verification document.

All tiers, automated
Retention Policy
Data Retention Enforcement

A retention policy defines how long data must be kept before it can be deleted. For regulated clients, this may be mandated by law: HIPAA requires medical records to be retained for a minimum of six years from creation or from the last date of service. We document and enforce your retention schedule and prevent deletion until the required period has elapsed.

Legal and HIPAA tiers
S3 Glacier
Cold Archive Tiering

Amazon S3 Glacier is a long-term archival storage class designed for data that needs to be preserved but is rarely accessed. Storage costs are significantly lower than S3 Standard. We automatically transition replica bucket objects to Glacier after 30 days, reducing ongoing costs for clients with large or growing archives while maintaining full redundancy.

Cold Archive and replica buckets

What happens at every step

From initial onboarding to monthly verification, here is the documented process that runs on your account.

Account provisioning

A dedicated IAM user and S3 bucket are created in your name. The bucket blocks all public access, versioning is enabled, and default encryption is applied. A matching GCP project and service account are created and scoped to your storage bucket only. No shared infrastructure.

Encryption configuration

Server-side encryption is enabled at the bucket level. For HIPAA-tier clients, AWS KMS customer-managed keys are configured with a dedicated key per client. Rclone crypt is configured for client-side encryption before upload, so plaintext never reaches the cloud provider.

Sync automation

Rclone syncs your local data to both AWS and GCP nightly at 2:00 AM. A dry-run is performed first to detect anomalies before any live transfer. Logs from every sync pass are written to your client folder and stored for 90 days.

AWS cross-region replication

Your primary AWS bucket in us-east-1 automatically replicates to a replica bucket in us-west-2. This replication is managed by AWS and runs continuously. Replica objects transition to S3 Glacier after 30 days to reduce long-term storage cost.

Weekly integrity checks

Every Sunday, Rclone compares the checksums of your local copy against your cloud copies and logs any discrepancies. A clean check means your three copies are identical. Any mismatch triggers immediate investigation and resolution before your monthly report is issued.

Monthly verification report

At the end of each month you receive a plain-language written report confirming: last successful sync date for AWS and GCP, storage used versus allocated, integrity check result for the month, any alerts raised and how they were resolved, and current bucket encryption status. This report is suitable for compliance documentation.