For CTOs & Platform Teams

Architecture & Deployment Models

How TATER runs, where data lives, what we integrate with, and how to deploy across SaaS, dedicated, and GCC High targets. Built to answer the questions a CTO has before a procurement review.

Hosting topology

TATER is a multi-tenant SaaS platform on Microsoft Azure with strict per-tenant data partitioning enforced server-side. Customer data never leaves the tenant boundary; cross-tenant queries are explicitly opt-in (SuperAdmin only) and use forceQueryPlan: true so the Cosmos SDK fans out across all partitions instead of routing to a single one.

User Browser
    │
    ├─→ www.tatersecurity.com  ──┐
    │                            ├─→ Azure Static Web App (swa-tater-marketing)
    ├─→ app.tatersecurity.com  ──┘    Marketing pages + TATER.html (app)
    │
    ├─→ ops.tatersecurity.com  ──→ Azure Static Web App (swa-tater-app)
    │                              TATER Ops (help desk, scripts, workflows)
    │
    ├─→ manage.tatersecurity.com →  Azure SWA — TATER Manage (SuperAdmin only)
    │
    ├─→ my.tatersecurity.com   ──→ Azure SWA — My TATER (per-user dashboard)
    │
    └─→ api.tatersecurity.com  ──→ Azure Function App (func-tater-sec-api)
                                          │
                                          ├─→ Azure Cosmos DB (ComplianceDB)
                                          │      Partition key: /tenantId
                                          │
                                          ├─→ Azure Key Vault (X.509 certs, secrets)
                                          │
                                          ├─→ Azure Automation Account
                                          │      Scan-M365Cloud, Run-Remediation, etc.
                                          │
                                          ├─→ Anthropic API (AI Compliance Analyst, MCP)
                                          │      Optional, BYOK supported
                                          │
                                          └─→ External SIEM (syslog/CEF or webhook)

All resources live in rg-tater-prod in the TATER Security subscription, Azure region East US 2. Federal/dedicated deployments are provisioned in a customer-isolated subscription with separate Cosmos accounts.

Deployment models

CapabilityMulti-tenant SaaSDedicated tenantGCC / GCC High
Hosting region Azure East US 2 (commercial) Customer-selected commercial region Azure Government (East/West US Gov) — roadmap 2026 H2
Cosmos isolation Per-tenant partition key Dedicated Cosmos account Dedicated Cosmos in Gov cloud
API surface api.tatersecurity.com Customer-vanity domain Customer-vanity domain on .gov / .mil
Time to provision Same-day with sales-assisted onboarding ~5–10 business days FedRAMP authorization gates timeline
BYOK support Yes (Anthropic AI) Yes (Anthropic + Cosmos CMK) Yes (Customer-managed keys throughout)
SOC 2 Type II In progress (Q4 2026) Inherits from SaaS attestation FedRAMP Moderate roadmap 2027–28
Backup/restore Continuous, 7-day PITR Continuous, configurable retention Continuous, customer-controlled
Pricing Per-user-seat, monthly Per-user-seat + dedicated infra fee Custom (sovereign-cloud premium)

On-prem self-hosted is not currently supported. The platform's compliance posture, threat-intel feeds (CISA KEV, EPSS, regulatory feeds), and AI capabilities depend on continuous cloud connectivity. Air-gapped deployment is on the roadmap behind GCC High but is not committed.

Data flow — what crosses each boundary

From customer endpoints → TATER

From customer M365 / cloud tenants → TATER

What we don't collect

Integrations matrix

TATER integrates with the systems your team already uses. Most integrations are read-only; write integrations are explicitly opt-in per organization.

SystemDirectionAuth methodScope
Microsoft Entra IDReadApp registration, certificate-basedUsers, groups, sign-ins, CA policies, PIM, auth methods
Microsoft Graph (M365)ReadApp registration, certificate-basedExchange, SharePoint, Teams, Defender, Intune, Purview
Microsoft Defender for EndpointReadApp registrationDevices, vulnerabilities, software inventory
Microsoft IntuneReadGraph APIDevice compliance, configuration profiles
Azure subscriptionsReadService principalResource inventory, RBAC, NSG rules, Key Vault, Defender for Cloud
Microsoft Sentinel / QRadar / ArcSight / SplunkWrite (audit forwarding)Syslog UDP/TCPCEF-formatted audit log entries
Generic webhook (HMAC-signed)WriteHMAC-SHA256Compliance events, override creation, scan completion
Jira / Jira Service ManagementRead + WriteAPI token (encrypted at rest)Ticket creation from issues, status sync
ServiceNowRead + WriteOAuth or basic (encrypted at rest)Incident / change request creation
Microsoft TeamsWriteWebhookNotifications
SlackWriteWebhookNotifications
Azure DevOpsRead + Write (bidirectional sync)PAT (encrypted at rest)Work items in/out, status sync via service hooks
SMTP / Microsoft Graph emailWriteApp password / Graph tokenNotification delivery, report email
Power BI / Power AutomateReadCustom connector + API keyCompliance datasets, scan completion triggers
Anthropic Claude APIRead + WriteAPI key (BYOK supported)AI Compliance Analyst, Evidence Agent, MCP server
CISA KEV feedReadNone (public)Known Exploited Vulnerabilities cross-reference
endoflife.dateReadNone (public)Software lifecycle data for app discovery

Every credential is encrypted at rest with AES-256-GCM. Every external write is HMAC-signed where the destination supports it. SSRF protection (private IP / metadata endpoint blocking) applies to every webhook URL.

Stack at a glance

Frontend
Vanilla JavaScript + CSS variables (no framework lock-in). Single-page apps deployed to Azure Static Web Apps. MSAL.js with 3-CDN fallback for Entra authentication.
API
Azure Functions v4 (TypeScript, Node.js 22). 75 MCP tools, 90+ REST endpoints, all rate-limited and audit-logged.
Database
Azure Cosmos DB SQL API. Per-tenant partition. Continuous backup with self-service PITR. Composite indexes on high-traffic containers.
Endpoint agent
Single static Go binary. CGO-free Windows + Linux. macOS arm64 + amd64 with system tray. SHA256-verified auto-update. Runs as Windows service / systemd / launchd.
Cloud scanning
Azure Automation runbooks (PS 5.1 + 7.2). Per-org dedicated Automation accounts for client tenant scans.
AI
Anthropic Claude (latest model). BYOK supported. MCP server (HTTP + stdio) with 75 tools. No customer data leaves Anthropic's commercial API path; no training on customer data.

Customer-side prerequisites

Microsoft 365 cloud scanning

Endpoint scanning

For SIEM forwarding

More questions? Architecture review calls are available for active prospects under NDA.

Request architecture review → Trust Center