Deployment¶
Root Security provides flexible deployment options to meet your organization's security and infrastructure requirements.
Deployment Options¶
Choose the deployment model that best fits your needs:
Model | Description | Best For |
---|---|---|
Cloud | Fully managed SaaS solution | Fast deployment, minimal maintenance |
Self-Hosted | Deploy in your own infrastructure | Maximum control, regulatory compliance |
Hybrid | Mix of cloud and on-premises components | Balance of control and convenience |
Deployment Considerations¶
When choosing a deployment model, consider:
- Security Requirements: Regulatory compliance, data residency, and security policies
- Integration Needs: Connectivity with existing systems and infrastructure
- Scale: User volume and authentication throughput requirements
- Operational Resources: Available IT resources for maintenance and updates
System Requirements¶
Cloud Deployment¶
- No infrastructure requirements
- Modern web browser for administrative console
Self-Hosted Deployment¶
Minimum requirements:
- Kubernetes 1.18+ or Docker 19.0+
- 2 CPU cores, 4GB RAM, 20GB storage per node
- TLS certificates for secure communication
- Database: PostgreSQL 11+ or MySQL 8.0+
- Load balancer for production deployments
High Availability¶
For production environments, we recommend:
- Redundant application nodes across availability zones
- Database replication and backups
- Load balancing and auto-scaling configurations
- Regular monitoring and health checks
Getting Started¶
Refer to our specific deployment guides: