Architecture Overview


How RiskPrism processes and protects your data.

RiskPrism is built on a secure, scalable microservices architecture optimized for high-volume vulnerability and asset data processing.

Core Architecture Components

  • Ingestion Layer
    • Connects to scanners, cloud tools, threat intelligence, and ITSM platforms
    • Supports API, CSV, XML, and JSON imports
    • Validates and normalizes data before processing
  • Risk Scoring Engine
    • Applies contextual risk scoring (0–500)
    • Uses BIA, threat intel, asset value, and exposure data
    • Real-time scoring updates triggered by new data
  • Correlation Engine
    • Identifies duplicate, overlapping, and inherited risks
    • Maps asset dependencies across environments
    • Highlights cross-tier impact
  • Workflow Engine
    • Automates prioritization, ticket creation, SLA tracking, and status sync
    • Integrates with Jira, ServiceNow, Azure DevOps, email, and Slack
  • Analytics Layer
    • Powers dashboards, heat maps, asset views, and trend analytics
    • Real-time update pipelines for interactive visualization
  • Presentation Layer
    • User interface
    • Custom dashboards
    • API-based programmatic access
Key Architectural Principles

  • Zero-trust microservice communication
  • Multi-tenant isolation (SaaS)
  • High availability with auto-scaling
  • Event-driven processing for real-time accuracy

Data Security


Enterprise-grade controls for confidentiality, integrity & availability.

RiskPrism follows strict security and privacy standards.

Encryption

  • AES-256 encryption at rest for all stored data
  • TLS 1.2+ encryption in transit across all communications
  • Per-tenant encryption keys (SaaS) to ensure full isolation
Data Retention

  • Configurable retention policies
  • Automatic deletion workflows based on customer settings
  • Full audit logs for every API and user action
Compliance

RiskPrism aligns with major global standards:

  • SOC 2 Type II
  • ISO 27001
  • PCI-DSS (data handling & operational controls)
Operational Security

  • Continuous internal vulnerability scanning
  • Third-party penetration testing
  • Strict RBAC & least-privilege access
  • Secure SDLC with code reviews & automated security scans

API Overview


Secure, REST-based APIs for automated workflows and custom integrations.

RiskPrism offers an API for:

  • Data ingestion
  • Risk score queries
  • Asset lookups
  • Workflow automation
  • Report generation
Public Endpoints (High-Level Overview)

Full endpoint documentation available after login.

  • GET /assets - Retrieve asset inventory
  • GET /vulnerabilities - List vulnerabilities with metadata
  • POST /workflows/tickets - Create/update tickets
  • POST /reports/export - Generate and download reports
  • POST /events/webhooks - Configure event notifications
Authentication

  • OAuth 2.0
  • API keys (scoped + rate-limited)
Response Format

  • JSON by default
  • CSV/PDF for export endpoints

Supported Data Formats


Flexible interoperability with scanners, cloud tools, and ITSM.

RiskPrism supports multiple ingestion & export formats.

Imports

  • CSV - Asset lists, vulnerability spreadsheets, inventory exports
  • JSON - API integrations, cloud findings
  • XML - Legacy scanner outputs
Exports

  • CSV - Reports, vulnerability lists, SLA summaries
  • JSON - API-exported data
  • PDF - Executive reports, compliance summaries
All imports undergo:

  • Schema validation
  • Normalization
  • Threat intel enrichment (if enabled)

System Requirements


Available as SaaS, On-Prem, or Hybrid.

SaaS Deployment

  • No infrastructure required
  • Automatic updates & scaling
  • Tenant-isolated encryption
On-Premise Requirements

Recommended for regulated industries (finance, healthcare, government).

Minimum specs:

  • 8+ vCPU
  • 32GB RAM
  • 500GB storage
  • Kubernetes / Docker support
  • PostgreSQL or MariaDB
Hybrid Deployment

  • Risk engine in cloud
  • Sensitive scanner/asset data processed on-prem
  • Secure communication tunnels

Performance Benchmarks


Optimized for high-volume, enterprise-scale environments.

Benchmark results from typical large environments:

  • 1,000,000+ vulnerabilities processed 12 minutes
  • Risk scoring calculation 2 seconds per asset
  • Dashboard load time: 300–600 ms
  • Executive report generation 3 seconds
  • Technical report generation 10 seconds

Performance scales automatically based on load and dataset size.