Workspace

The Workspace in autobotAI offers a cloud-based automation platform powered by an AI engine, enabling users to build and deploy automation bots at scale. With the option to deploy the Workspace on AWS, you maintain control over the AWS account that hosts the Workspace, managing infrastructure, security, and scalability while focusing on automation workflows.

Draw.io Diagram

Typical Customer Deployment Overview

When you deploy autobotAI Workspace, the following AWS resources are automatically provisioned in your AWS account:

Compute Resources

  • AWS Lambda Functions: Serverless execution engine for automation workflows and API operations
  • Amazon ECS Cluster (Fargate): Containerized execution for long-running processes and complex integrations

Data Storage

  • Amazon DynamoDB (1 table): Stores workflow metadata, execution history, and user configurations
  • Amazon DocumentDB (2 collections): Stores bot definitions, integration configurations, and audit logs

Networking

  • Amazon VPC: Private isolated network environment for all workspace resources
  • Private Subnets: Host compute and database resources securely
  • Public Subnets: Host Application Load Balancer and NAT Gateway
  • Internet Gateway: Provides internet connectivity
  • NAT Gateway: Enables outbound internet access from private subnets
  • Elastic IP: Static IP address assigned to NAT Gateway
  • Security Groups: Control inbound and outbound traffic for each service tier
  • Network ACLs: Additional subnet-level security controls

API and Authentication

  • Amazon API Gateway: RESTful API endpoint for all workspace operations
  • Amazon Cognito User Pools: User authentication and authorization
  • Amazon Cognito Identity Pools: Federated identity management for AWS service access

Security and Access Control

  • IAM Roles: Lambda execution role, ECS task role, API Gateway execution role
  • Custom IAM Policies: Least-privilege access policies for each service component

Monitoring and Logging

  • Amazon CloudWatch Events: Scheduled automation triggers
  • Amazon CloudWatch Logs: Centralized logging for all services
  • Amazon CloudWatch Metrics: Performance monitoring and alerting

Note: All resources are deployed within your AWS account. You maintain complete control and ownership of all data and infrastructure.

Architecture: Customer-hosted in your AWS account
Control: Full control over infrastructure, data, and configurations
Availability: Multi-AZ deployment for high availability within a single AWS region

Key Characteristics:

  • All resources deployed in customer's AWS account as serverless application.
  • Data residency maintained within selected AWS region
  • Private VPC deployment with customer-managed networking
  • Supports AWS regions: us-east-1, ap-south-1 (additional regions coming soon)
  • Automatic failover across Availability Zones within the region
  • Suitable for organizations requiring full infrastructure control and data sovereignty

Note: For Self-hosted autobotAI workspace, Cross-region deployment and disaster recovery capabilities are available for Workspace deployments with Enterprise support.

Important: For Self-hosted autobotAI workspace, Multi-region active-active deployment is not currently supported. Cross-region replication is available for disaster recovery purposes only.

  1. Scalability: Workspace on AWS enables users to build scalable services that can adjust based on the size and complexity of automation workloads. Users can customize compute and networking configurations for tailored performance.

  2. AWS Cognito Integration: Integrate with AWS Cognito to authenticate users via built-in accounts or Single Sign-On (SSO), ensuring secure and efficient user management for automation engineers.

  3. AWS ECS & Lambda Integration: Workspace utilizes AWS ECS and AWS Lambda to run automation workflows, allowing users to leverage powerful serverless compute capabilities in a collaborative, low-code environment.

  4. AWS API Gateway Integration: API Gateway connects the serverless components of Workspace with the frontend, providing AWS-native security and availability controls for seamless automation service interactions.

  5. AWS DynamoDB & DocumentDB: Workspace uses NoSQL databases, such as DynamoDB and DocumentDB, to store metadata and bot-related data within a private VPC. This setup ensures data ownership and control, with data securely stored within your AWS environment.

  6. Security and Compliance: Workspace on AWS includes role-based access control, encryption, and compliance with standards such as HIPAA and GDPR. Additionally, AWS security features, such as IAM and VPC, further secure automation workflows.

Resource Sizing and Scalability

Serverless Auto-Scaling

autobotAI leverages AWS serverless services to dynamically scale compute and storage resources, minimizing the need for manual capacity planning.

ServiceSizing ModelDefault Capacity / RangeNotes
AWS LambdaAuto-scaling based on demand1 GB memory, <1,000 concurrent executionsMemory automatically adjusts per workload
Amazon ECS (Fargate)Auto-scaling based on CPU and memory utilization0.25 - 4 vCPU, 0.5 - 350 GB RAMScales task count based on policy
Amazon DynamoDBOn-demand or provisioned capacity modeAutomatically scales read/write unitsSupports burst capacity
Amazon DocumentDBFixed instance size, scalable storageDefault: 2 x r5.large instancesEnterprise can customize instance size

Default Configuration

  • No manual intervention needed for typical usage.
  • Workloads automatically sized for performance and cost.
  • Enterprise customers may request reserved capacity for predictable workloads.

Custom Sizing (Enterprise)

For large-scale deployments, custom sizing options include:

  • Reserved read/write capacity for DynamoDB
  • Dedicated ECS cluster sizing and task limits
  • DocumentDB instance type and cluster scaling
  • Custom VPC CIDR ranges and subnet sizes

Note: Performance monitoring dashboards provide real-time capacity metrics to aid scaling decisions.

AWS Services Utilized by Workspace

  • Lambda Functions
  • ECS Cluster (Fargate-based)
  • DynamoDB (1 instance)
  • DocumentDB (2 tables)
  • AWS VPC, Subnets, Elastic IP, and Internet Gateway
  • API Gateway (for secure frontend connection)
  • Cognito User Pools and Cognito Identity Pools
  • IAM Roles and Custom Policies
  • CloudWatch Events (for scheduled automation)
  • CloudWatch Logs (for monitoring and logging)

Security Best Practices

Principle of Least Privilege

To minimize security risks, follow these least privilege best practices:

  1. Initial Deployment Permissions

    • Customer can choose to update an IAM user permissions applied with default settings during initial deployment.
    • After deployment, remove AdministratorAccess and assign users the minimum permissions required for daily operations.
  2. Service-Specific IAM Roles
    autobotAI automatically creates and attaches the following roles with narrowly scoped permissions:

    • Lambda Execution Role: Access only to specific DynamoDB tables and CloudWatch Logs
    • ECS Fargate Execution Role: Permissions to pull container images from ECR and log to CloudWatch
    • API Gateway Role: Permission to invoke designated Lambda functions
  3. Custom IAM Policies

    • Review the auto-generated IAM policies in your AWS console.
    • Add inline comments or descriptions to each policy explaining its purpose.
    • Use AWS Managed Policies sparingly; prefer custom policies scoped to only necessary actions and resources.
  4. Ongoing Access Review

    • Conduct quarterly IAM role and policy reviews in IAM Access Analyzer.
    • Revoke unused roles and policies.
    • Enable AWS CloudTrail to audit API calls for sensitive operations.

Note: Detailed IAM policy JSON examples are available in the Security Best Practices section of our documentation.

Encryption Keys – Purpose and Location

autobotAI uses AWS Key Management Service (KMS) keys to secure data at rest. The following keys are created:

Key NamePurposeAWS Service UsedLocation (Region)
autobotAI-DynamoDB-KeyEncrypts DynamoDB table data at restDynamoDB SSE-KMSSame as deployment region
autobotAI-DocumentDB-KeyEncrypts Amazon DocumentDB storage at restDocumentDB KMS (Optional)Same as deployment region
autobotAI-CloudWatch-LogsEncrypts CloudWatch Logs groups and log streamsCloudWatch SSE-KMSSame as deployment region
autobotAI-Backup-StorageEncrypts S3 bucket for bot import/export backupsS3 SSE-KMSSame as deployment region

Note:

  • Customer-managed KMS keys are optional and can be configured with enterprise support.
  • Key rotation is enabled annually for AWS-managed keys.
  • For higher compliance, you can configure custom key rotation schedules in the KMS console with enterprise support.
  • All key usage events are logged in AWS CloudTrail for auditing.

Sensitive Data Storage and Encryption at rest

All customer data is stored within your AWS account in secure, private resources:

Data CategoryStorage ServiceStorage Location (Subnet)Encryption
Workflow MetadataAmazon DynamoDBPrivate Subnets in VPCSSE-KMS (AWS Default)
Bot Definitions & ConfigAmazon DocumentDBPrivate Subnets in VPCSSE-KMS (AWS Default)
autobotAI LogsAmazon CloudWatch LogsPrivate endpointSSE-KMS (AWS Default)
Integration CredentialsAWS Secrets ManagerPrivate endpointSSE-KMS (AWS Default)
Audit TrailsAWS CloudTrailS3 (private bucket)SSE-KMS (AWS Default)

Note:

  • All data is encrypted at rest either using AWS managed or customer-managed keys.
  • No data leaves your AWS account unless you explicitly configure cross-region replication or data export.
  • Access to all data stores is governed by least-privilege IAM roles and policies.

Encryption in Transit

Communication PathProtocolCertificate/Key Management
User ↔ API GatewayTLS 1.2+AWS Certificate Manager (ACM)
API Gateway ↔ Lambda / ECSHTTPSAWS internal TLS
Lambda / ECS ↔ DynamoDB / DocumentDBTLSAWS SDK encrypted connections

Note: All public endpoints enforce HTTPS-only access. HTTP traffic is redirected to HTTPS.

Disk and Volume Encryption

Although autobotAI uses serverless services (Lambda, Fargate) with managed storage, any attached EBS volumes (if used for custom tasks) should be encrypted:

Network Configuration

autobotAI Workspace is deployed in a dedicated VPC with public and private subnets, employing security groups and network ACLs for layered security.

VPC and Subnets

  • VPC CIDR Block: 10.0.0.0/16 (customizable for Enterprise customers)
  • Public Subnets (2 AZs):
    • 10.0.1.0/24 in AZ A
    • 10.0.2.0/24 in AZ B
  • Private Subnets (2 AZs):
    • 10.0.10.0/24 in AZ A
    • 10.0.20.0/24 in AZ B
  • Database Subnets (2 AZs):
    • 10.0.30.0/24 in AZ A
    • 10.0.40.0/24 in AZ B

Note: Above mentioned subnets are default subnets from automated deployment cloudformation, Customer has option to choose different CIDR range during workspace deployment.

Internet Gateway and NAT Gateway

  • Internet Gateway: Attached to the VPC for public subnet egress/ingress
  • NAT Gateway: Deployed in each public subnet, with Elastic IPs for outbound internet access from private subnets

Route Tables

Route TableAssociated SubnetsRoutes
Public-RTPublic subnets0.0.0.0/0 → Internet Gateway
Private-RTPrivate subnets0.0.0.0/0 → NAT Gateway
Database-RTDatabase subnets10.0.0.0/16 → local (no internet)

Security Groups

Security Group NamePurposeIngress RulesEgress Rules
autobotAI-ALB-SGAPI Gateway / ALBTCP 443 from 0.0.0.0/0All outbound
autobotAI-App-SGLambda & ECS tasksTCP 443 from autobotAI-ALB-SGTCP 443 to Database-SG
autobotAI-Database-SGDynamoDB, DocumentDB (private)TCP 443 from autobotAI-App-SGNone

Note: Security groups follow the principle of least privilege. Do not open additional ports without security review.

Network ACLs

  • Public NACL: Allows inbound 80/443, all outbound
  • Private NACL: Allows outbound 80/443, ephemeral port range 1024–65535 inbound
  • Stateless Rules: Explicit DENY for all other traffic

Caution: Network ACLs are stateless; ensure both inbound and outbound rules are configured appropriately.

Network ACLs

  • Public NACL: Allows inbound 80/443, all outbound
  • Private NACL: Allows outbound 80/443, ephemeral port range 1024–65535 inbound
  • Stateless Rules: Explicit DENY for all other traffic

Caution: Network ACLs are stateless; ensure both inbound and outbound rules are configured appropriately.

Costs and Billing Overview

Below is a list of AWS services used by autobotAI Workspace, with guidance on which are core (mandatory) and which are optional based on feature usage.

AWS ServiceUsage PurposeBilling ModelMandatory?Notes
AWS LambdaExecution of automation workflowsPer request + durationYesCore compute layer
Amazon ECS (Fargate)Long-running integrationsvCPU and memory usageYesCore compute for container workflows
Amazon DynamoDBMetadata, configs, execution historyOn-demand or provisioned capacityYesCore data store
Amazon DocumentDBBot definitions and audit logsInstance hours + storageYesCore data store
Amazon API GatewayExposes RESTful APIsPer million requests + data transferYesCore API interface
Amazon CognitoUser authentication and identity managementMAUs (monthly active users)YesCore authentication
Amazon S3Bot import/export storagePer GB stored + request feesOptionalOnly if using import/export functionality
AWS Key Management Service (KMS)Encryption at restPer key per month + API callsOptionalAdditional compliance/encryption costs
Amazon CloudWatchLogs and metrics storagePer GB ingested + custom metricsYesCore monitoring
Amazon CloudTrailAPI call audit loggingPer GB delivered to S3OptionalRecommended for compliance, can archive externally
Amazon BedrockInferance tokensPer API call and inferance tokenOptionalRecommended for agentic secops workflow

Note:

  • For exact pricing, refer to the AWS Pricing Calculator and your AWS Marketplace subscription details.
  • Enterprise customers may negotiate reserved capacity for DynamoDB or Lambda Provisioned Concurrency for cost savings.

Software Upgrades and Patch Management

autobotAI operates on a fully serverless AWS infrastructure, leveraging AWS managed services for compute, storage, and networking. Consequently, manual system-level patching or hardening is not required.

Workspace Version Upgrades

  • autobotAI releases new workspace versions periodically, containing backend code, runtime updates, container images, and database schema changes if necessary.
  • Customers initiate workspace upgrades via the autobotAI portal, selecting the desired version.
  • The upgrade process includes automated deployment of new AWS Lambda functions, ECS Fargate tasks, and database migrations.
  • autobotAI manages version rollbacks and staged rollouts internally to ensure stability.

Note: Customers should monitor upgrade notifications and plan workspace version upgrades during planned maintenance windows to minimize workflow disruption.

Workspace Health Monitoring

Workspace health can be effectively monitored through the following methods:

1. autobotAI Activity Notification

  • The workspace provides an Activity Tab that tracks bot execution events, success/failure rates, and operational anomalies.
  • Monitor workflow execution outcomes in near real-time to identify failed runs or workflow bottlenecks.
  • Configurable alerting mechanisms allow email or webhook notifications on critical failure events.

2. AWS Native Logs and Metrics

  • Amazon CloudWatch Logs capture detailed logs for Lambda functions, ECS tasks, and API Gateway.
  • Key CloudWatch metrics include:
    • Lambda invocation count, duration, error rate
    • ECS CPU and memory utilization
    • DynamoDB read/write capacity and throttling
    • API Gateway request count, latency, and errors

Monitoring these metrics provides insight into the operational health of autobotAI components and identifies potential infrastructure or integration issues.

Note:
Combining autobotAI's activity monitoring with AWS CloudWatch metrics delivers a comprehensive view of system health and performance, enabling prompt detection and response.