Skip to content

Threat Model: Cloud System Design (Sprinklr Live Chat)

Scope

This document presents the threat model for the cloud infrastructure supporting Sprinklr Live Chat. It focuses on the AWS-based architecture, network boundaries, storage, APIs, and cloud-native services, identifying key threats and mitigations specific to the cloud environment. Application-level threats are covered in a separate document.


Cloud Trust Boundaries

  • Public Internet → AWS VPC: Entry point for all user and partner traffic; exposed via Elastic Load Balancers (ELB), API Gateways, and CloudFront. The same gateway is used for public access by end users, partner services (S2S/API), and partner admins accessing the Sprinklr integration dashboard.
  • Partner Organization → Sprinklr SaaS Cloud: S2S/API calls from partner backends to Sprinklr cloud endpoints, secured with mutual TLS (mTLS) authentication to ensure only authorized partners can communicate with Sprinklr Cloud backend.
  • Sprinklr SaaS Internal Segmentation: Isolation between microservices, databases, storage, and LLM context services within the VPC.
  • Sprinklr SaaS → External LLM APIs: Outbound calls to third-party LLM providers (e.g., OpenAI, Anthropic).
  • Admin Access → Cloud Management Plane: Access by Sprinklr engineers to AWS console, infrastructure as code, and CI/CD pipelines.
  • Multi-Region Deployment: Sprinklr Live Chat is deployed across multiple AWS regions to ensure high availability, performance, and system uptime for all tenants.

High-level Design

flowchart TD subgraph Public["Public Internet"] PUB["End User / Client Web App"] CAU["Client Admin User"] end subgraph VPC["AWS VPC (Sprinklr SaaS Trust Boundary)"] ALB["Application Load Balancer (WebSocket-enabled, Public)"] AGW["API Gateway"] ECS["ECS/EKS (App Services)"] LLM["LLM Context Service"] RDS["RDS/Database"] S3PUB["S3 (Public: Static SPA Assets)"] S3PRIV["S3 (Private: FAQ/Knowledge Data)"] REDIS["Redis/Cache"] LOGS["CloudWatch Logs"] CF["CloudFront CDN"] DASH["Sprinklr Dashboard (SPA)"] end subgraph LLMExt["LLM AI Service (External)"] LLMAPI["OpenAI / Anthropic / etc."] end %% All users access via ALB PUB -- "HTTPS / WebSocket" --> ALB CAU -- "HTTPS" --> ALB %% ALB routes to API Gateway and ECS ALB -- "API / WebSocket" --> AGW ALB -- "API / WebSocket" --> ECS %% Dashboard (SPA) is served as static assets via CloudFront CF -- "Serves SPA Static Assets" --> PUB S3PUB -- "Static Assets" --> CF %% Dashboard (SPA) API calls go via ALB -> AGW -> ECS AGW -- "Routes API Calls" --> ECS DASH -- "API Calls" --> AGW %% ECS/LLM access private S3 for FAQ/Knowledge ECS -- "FAQ/Knowledge Access" --> S3PRIV LLM -- "FAQ/Knowledge Access" --> S3PRIV %% ECS/LLM internal flows ECS --> LLM ECS --> RDS ECS --> REDIS ECS --> LOGS LLM --> RDS %% LLM Context Service calls external LLM API LLM -- "API Call" --> LLMAPI %% Static SDK delivery (if needed) S3PUB -- "SDK Static Files" --> CF %% Dashboard login/integration management via ALB ALB -- "Dashboard HTTPS" --> DASH

STRIDE Threat Mapping: Cloud Components

Cloud Component S T R I D E Key Mitigations
Application Load Balancer TLS, WAF, DDoS protection, strict routing, logging, multi-region, auto-scaling
API Gateway AuthN/Z, input validation, rate limiting, audit logs, single entry point for all public/partner/admin access
ECS/EKS (App Services) Network segmentation, IAM roles, container hardening, logging, multi-tenancy isolation
RDS/Database Encryption at rest, VPC-only access, IAM, audit logs
S3 (Public/Private) Bucket policies, encryption, S3 Block Public Access, versioning
CloudFront CDN Signed URLs, HTTPS-only, origin restrictions, logging
LLM Context Service IAM, input validation, output filtering, least privilege
Cloud IAM & Management MFA, least privilege, audit logs, change management
VPC Networking Security groups, NACLs, private subnets, flow logs
CI/CD Pipeline Pipeline isolation, secrets management, code review, audit logs

Legend:
S = Spoofing, T = Tampering, R = Repudiation, I = Information Disclosure, D = Denial of Service, E = Elevation of Privilege


Key Cloud Risks & Mitigations

  • Public Exposure of Services:
  • Mitigation: Restrict public endpoints, use WAF, enforce HTTPS, monitor for open ports. Use a single, well-audited gateway (API Gateway/ELB) for all public, partner, and admin access to reduce attack surface.
  • Misconfigured IAM Roles/Policies:
  • Mitigation: Principle of least privilege, regular IAM audits, automated policy checks.
  • Data Leakage from S3 or RDS:
  • Mitigation: S3 Block Public Access, encryption, VPC-only access, audit logs.
  • Lateral Movement within VPC:
  • Mitigation: Micro-segmentation, security groups, NACLs, service-to-service auth. Enforce mTLS for all S2S/API communication between partner backends and Sprinklr Cloud backend.

  • Certificate, Key, and Secret Management:

  • Mitigation:

    • Use a centralized secrets management solution (e.g., AWS Secrets Manager, HashiCorp Vault) for all mTLS certificates, API keys, and sensitive configs.
    • Enforce automated certificate/key rotation and expiration policies.
    • Monitor vault access and changes with audit logging and alerting.
    • Encrypt secrets at rest and in transit.
    • Restrict vault access to least-privilege roles and require MFA for sensitive operations.
    • Regularly review and test incident response for key/certificate compromise.
  • Compromised CI/CD Pipeline:

  • Mitigation: Secrets management, pipeline isolation, code review, audit logging.
  • Abuse of Cloud Management Plane:
  • Mitigation: MFA, role-based access, change management, monitoring.
  • DDoS Attacks:
  • Mitigation: AWS Shield, rate limiting, auto-scaling, WAF. ELB and multi-region deployment ensure scalability and service continuity in a multi-tenant SaaS environment.
  • Supply Chain Attacks (Dependencies, Images):
  • Mitigation: Signed images, dependency scanning, SRI, version pinning.

Cloud-Specific Incident Response

  • Enable and monitor CloudTrail, VPC flow logs, and GuardDuty.
  • Define runbooks for cloud incident response (e.g., key compromise, data breach, DDoS).
  • Regularly test backup and disaster recovery procedures, including multi-region failover.
  • Automate alerting for anomalous cloud activity (IAM, network, storage).
  • Ensure mTLS certificate/key compromise can be rapidly detected, contained, and rotated.
  • Monitor and audit all access to secrets management/vault systems; alert on suspicious or unauthorized access.
  • In the event of a secret or certificate compromise:
  • Immediately revoke and rotate affected credentials in the vault.
  • Audit all recent access and changes to vault/config management.
  • Notify affected partners and internal teams.
  • Review and update incident response and recovery procedures.

Summary

This threat model addresses the unique risks and mitigations for the cloud infrastructure supporting Sprinklr Live Chat, including mTLS authentication for partner-to-cloud communication, unified gateway architecture, ELB-based scalability, and multi-region deployment for availability and uptime. For application-level threats and secure architecture, see the corresponding documents.