Shared Responsibility Model

Prev Next

Lobster Cloud operates on a shared responsibility model. This means that Lobster and you as the customer each have clearly defined areas of responsibility. This page provides you with a transparent overview of who manages what, so there are no ambiguities about ownership and accountability.


Overview

As a fully managed iPaaS solution, Lobster takes responsibility for the complete infrastructure layer. This includes provisioning, maintaining, securing, and monitoring all components of your cloud environment. You are responsible for using the Lobster Data Platform to configure and manage your integration processes.

The following sections break down responsibilities by area in detail.


Infrastructure and operations

Responsibility

Lobster

Customer

AWS infrastructure (EC2, RDS, VPC, Redis, EFS)

Fully managed

No access

Operating system installation and updates

Fully managed

No action required

Database administration and maintenance

Fully managed. The database runs in a protected private network with no external access. No connection via VPN or the internet is possible. Only the corresponding Lobster web server has access to the database.

No access

Network and firewall configuration

Managed by Lobster. Changes via support ticket.

Request changes via ticket if needed

System provisioning and decommissioning

Fully managed

Details will be clarified during the onboarding process.

System restarts

Performed by Lobster upon request

Submit a

Storage management

Fully managed. Lobster monitors storage usage and informs you proactively when capacity is running low.

If additional storage is needed, contact your Lobster Sales representative. A separate quote is required for storage extensions.


Security

Responsibility

Lobster

Customer

Firewall rules and security groups

Managed by Lobster

Request IP-based rule changes via ticket

SSL certificates (Let's Encrypt)

Automatically provisioned and renewed

No action required

Custom SSL certificates

No access

Provide certificate, manage annual renewal

Vulnerability management

Continuous scanning and patching by Lobster

No action required

Penetration testing

Conducted regularly by Lobster's internal and external security teams or service providers

your

Incident handling and response

Managed by Lobster Cloud Operations and the SOC team

Informed via ticket when incidents occur

Data encryption in transit

Enforced via HTTPS/TLS

No action required

User access to Lobster Data Platform

Lobster has no access to your Lobster Data Platform at any time. The initial login credentials are generated automatically and sent directly to you. They are not known to Lobster.

Full responsibility for managing all users, passwords, and permissions within the platform.


Software and updates

Responsibility

Lobster

Customer

Lobster DATA Platform software updates

Deployed automatically on a fixed schedule (test first, production three weeks later)

No action required. Optional: Manage updates yourself via Update Center.

Operating system patches

Applied monthly on the 1st Sunday

No action required

Database maintenance

Performed weekly (every Monday)

No action required

Version compatibility

Lobster always provides the latest available version in the Lobster Cloud.

If you manage updates yourself, test thoroughly before production deployment

Notification of planned maintenance

Approximately 7 days in advance via the status page and as a notification directly in the news feed of the affected system (LDP)

Check notifications and schedule maintenance accordingly


Network and connectivity

Responsibility

Lobster

Customer

VPN connection (Lobster side)

Configured and managed by Lobster

Configure your firewall (IPSec/IKE, static public IP). Ensure compatibility.

VPN connection (customer side)

Not managed by Lobster

Full responsibility for your on-premise firewall and VPN configuration

Port openings

Opened by Lobster upon request

Submit a ticket with the desired ports and IP addresses. Ensure ports are also open in your local firewall.

DNS (standard .lobster-cloud.com)

Provisioned automatically

No action required

DNS (custom domain names)

Lobster provides public IP addresses

Create and manage your own DNS records (A-Record or CNAME)

Internal DNS resolution (Route53)

Configured by Lobster if requested (chargeable)

Provide access to your internal DNS servers; open Port 53

Email server

Not provided by Lobster

Provide your own SMTP server (Port 587), credentials, and sender/recipient addresses


Monitoring and backup

Responsibility

Lobster

Customer

24/7 automated system monitoring

Included as standard

No action required

Proactive incident resolution

Lobster resolves most issues automatically

Informed via ticket after resolution

Premium Monitoring (24/7 on-call)

Available as an optional upgrade

Contact Lobster to activate

Daily backups

Automated (production: 30 days, test: 7 days)

No action required

Backup restoration

Performed by Lobster upon request

Submit a ticket to request restoration


Lobster Data Platform usage

Responsibility

Lobster

Customer

Platform configuration (profiles, jobs, mappings)

Not managed by Lobster

Full responsibility

Administration of users and permissions within the platform

Not managed by Lobster

Full responsibility

Integration logic and data flows

Not managed by Lobster

Full responsibility

Testing of business processes after updates

Not managed by Lobster

Recommended after each software update on your test system

Customization requests

Processed via support ticket

Submit requests via support@lobster.de


What you cannot do in Lobster Cloud

The following restrictions apply to all Lobster Cloud environments. They are in place to ensure security, stability, and consistent service quality across all customer systems.

Restriction

Reason

No direct access to servers, operating systems, or databases

Managed service approach. All infrastructure is maintained exclusively by Lobster.

No SSH, shell, or root access

Security policy. No direct system access is provided.

No installation of third-party software, scripts, or containers

Prevents security vulnerabilities from uncontrolled software. Lobster maintains full control over the environment.

No execution of custom scripts (Bash, Python, PowerShell)

Same security rationale as above.

No modification of standard ports (443, 9000, 8020, 80)

These are fixed system ports used by the Lobster DATA Platform and cannot be changed.

No use of DNS names in firewall rules

AWS security groups are IP-based only.

No NAT routing in VPN connections

AWS limitation for Site-to-Site VPN.


Support channels

All requests, whether technical issues, change requests or questions, must be submitted through the official Lobster support channels:

Channel

Purpose

support@lobster.de

Technical support, incident reports, service requests, and change requests

All requests must be submitted through the ticket system. This ensures traceability, prioritization, and SLA compliance for every customer request.


Shared responsibility model — Lobster Cloud hosting

Summary

Area

Lobster

Customer

Infrastructure (AWS, OS, database)

Full ownership

No access

Security (firewall, certificates, patching)

Full ownership

Request changes via ticket

Software updates

Automatic deployment

Optional self-management via Update Centre

Network (VPN, DNS, ports)

AWS-side configuration

Customer-side configuration (firewall, DNS, email server)

Monitoring and backups

Fully automated

No action required

Lobster Data Platform usage

Not managed

Full ownership

Support

Provided via ticket system

All requests via support@lobster.de. Storage extensions via Sales contact.