Skip to Content

Jitterbit security and architecture white paper


Jitterbit delivers powerful integration tools and services through a multi-tenant cloud integration platform called Harmony.

While Harmony can drastically simplify and speed up most aspects of managing integration processes, the introduction of a multi-tenant cloud system can raise security questions for customers and users.

Harmony manages information security by applying an information security framework (hybrid model) based on NIST, CIS, CSA, and CERT recommendations. Jitterbit has also been certified to meet the requirements of:

Security and architecture

The pages in this topic describes the following aspects of security provided by the Harmony platform:

  • Logical security and architecture
    Logical security is comprised of all the security measures taken within the Harmony software. These include the system architecture; major components; Harmony users, organizations, and roles; Harmony environments and access control; Harmony data storage; and Harmony security topologies.

  • Physical security
    Physical security involves the hosting of Harmony on AWS cloud infrastructure. AWS provides a platform that addresses Harmony’s scalability and availability and many of its security requirements. This section describes infrastructure compliance; physical and environmental security; business continuity management; high availability and fault tolerance; network security; secure design principles; change management; Amazon EC2 security; load balancing security; data storage; and data durability and reliability.

  • Organizational security
    Organizational security covers operational best practices of leading cloud-computing providers around the world. This includes confidentiality; the personnel policy; the Jitterbit Operations, Engineering, and QA teams; the Harmony Trust site; identity and access management; patch management and high availability; and capacity management.

This document takes a broad view of security and covers things to consider from the perspective of availability and performance, in addition to data protection.