Technical Overview for Data Security Managers – Version: 1.0
Document Purpose
This document details the technical security architecture of Transmute Engine ™ by Seresa, including data retention policies, automated deletion mechanisms, access controls, and infrastructure isolation options.
System Overview
Platform: Node.js v22
Database: MongoDB with TTL indexes
Architecture: Ephemeral data processing pipeline
Data Model: Event-based, short-term retention only
Transmute Engine processes analytics events and routes them to configured third-party integrations (GA4, Facebook Pixel, etc.) – we call these outPIPE’s.
The system is designed for minimal data persistence with automated, database-level deletion.
Data Retention Policy
Successful Events
- Retention Period: Maximum 60 minutes after successful delivery to all configured integrations
- Deletion Mechanism: MongoDB TTL index with expireAfterSeconds: 3600
- Trigger: allDeliveredfield populated upon successful delivery to all endpoints
Failed Events
- Retention Period: Maximum 48 hours from initial event timestamp
- Deletion Mechanism: MongoDB TTL index with expireAfterSeconds: 172800
- Trigger: Applied to events with deliveryStatuscontaining “pending” or “failed” states
Guaranteed Deletion
- TTL monitor runs every 60 seconds as MongoDB background thread
- Operates independently of application health
- Cannot be disabled or delayed by application code
- Continues functioning during system failures or maintenance
Technical Implementation: MongoDB TTL Indexes
TTL Index 1: Delivered Events
db.events.createIndex(
  { "allDelivered": 1 }, 
  { 
    expireAfterSeconds: 3600,
    partialFilterExpression: {
      "allDelivered": { $exists: true }
    }
  }
)
Function: Targets documents where all configured integrations have successfully received the event.
Behavior:
- Documents deleted when allDelivered + 3600 seconds < current_time
- Only affects documents with allDeliveredfield present
- Partial index reduces index size and improves performance
TTL Index 2: Unsent/Failed Events
db.events.createIndex(
  { "timestamp": 1 }, 
  { 
    expireAfterSeconds: 172800,  // 48 hours
    partialFilterExpression: {
      $or: [
        { "deliveryStatus.*.status": "pending" },
        { "deliveryStatus.*.status": "failed" }
      ]
    }
  }
)
Function: Targets events that failed delivery attempts or remain pending after retry logic exhaustion.
Behavior:
- Documents deleted when timestamp + 172800 seconds < current_time
- Only affects documents matching partial filter expression
- Ensures failed events don’t persist indefinitely
Why TTL Indexes
Database-Level Enforcement: Deletion logic exists in MongoDB core, not application code. This prevents:
- Deletion bypasses through code bugs
- Retention extension through developer error
- Manual intervention to preserve data
Operational Independence: TTL monitor operates as separate MongoDB thread. Continues functioning during:
- Application crashes
- Deployment cycles
- System maintenance
- Network interruptions
Audit Trail: TTL operations logged in MongoDB metrics (db.serverStatus().metrics.ttl) for compliance verification.
Data Flow and Retry Logic
Successful Delivery Path
- Event received via WordPress plugin
- Event stored with TTL index on timestampfield (48-hour failsafe)
- Parallel delivery to all configured integrations
- Upon all successful deliveries: allDeliveredfield set to current timestamp
- First TTL index (delivered events) takes precedence
- Event deleted within 60 minutes
Failure Handling Path
Immediate Retry (0-60 seconds):
- 3 retry attempts within first minute
- Exponential backoff: 5s, 15s, 30s intervals
- Most transient failures resolved in this window
Dead Letter Queue (1-48 hours):
- Events failing initial retries moved to DLQ
- Additional 3 retry attempts distributed over 48 hours
- Retry intervals: 6 hours, 24 hours, 47 hours
- Allows recovery from extended third-party outages
Final Deletion (48 hours):
- Events still undelivered after all retry attempts permanently deleted via TTL index
- No archival, no backup retention
- Failure statistics updated (counts only, no event data)
Access Control Architecture
Engineering Team Access
Permitted:
- System health metrics via external monitoring APIs
- Aggregate error counts and delivery success rates API only
- Server resource utilization API only (CPU, memory, disk)
- Application logs via API only (sanitized, no PII)
Prohibited (and no engineer access) :
- Direct database queries containing event data
- Event payload content
- Customer PII (names, emails, transaction details)
- Individual event inspection or debugging with real data
Technical Enforcement
- Database access restricted to application service accounts
- No direct shell access to production database servers
- Query logs monitored for unauthorized access patterns
- Application logs configured to exclude event payload data
Infrastructure Isolation: Dedicated Servers
Available On: Premium and Enterprise plans
Architecture
Shared Infrastructure (Standard Plans):
- Single and multi-tenant server environment application servers
- Shared MongoDB instances with logical database separation
- Sufficient for most use cases with proper data lifecycle management
Dedicated Infrastructure (Premium+ Plans):
- Single-tenant server environment
- Dedicated MongoDB instance
- Isolated processing queues and memory space
- No resource sharing with other clients
Security Benefits
Data Isolation: Event data never coexists with other customers’ data—not in memory, processing queues, or storage.
Attack Surface Reduction: Breach of one client’s application logic cannot access another client’s data.
Compliance: Satisfies data residency and isolation requirements for regulated industries (healthcare, finance, government).
Performance Consistency: No resource contention from other clients’ high-volume periods.
Use Cases
- Healthcare: HIPAA compliance requirements
- Finance: PCI-DSS data isolation mandates
- Enterprise: Internal security policy requirements
- Government: Data sovereignty regulations
Self-Healing Architecture
Automated Recovery Mechanisms
Health Monitoring:
- Continuous process health checks
- Memory leak detection
- Unhandled exception monitoring
- Third-party integration availability tracking
Automatic Restart Logic:
- Critical service failures trigger immediate restart
- Exponential backoff for repeated failures
- Circuit breaker patterns for failing third-party integrations
- Prevents cascade failures
Recovery Procedures:
- Event processing queue restoration from last known state
- Retry logic resumes from last checkpoint
- TTL indexes continue operation regardless of application state
Security Implications
- Reduces manual intervention requirements
- Minimizes engineer access to production systems
- Maintains data deletion schedules during incidents
- Prevents data accumulation during extended outages
Compliance and Audit
Data Minimization
System design inherently supports GDPR Article 5(1)(c) – data minimization principle:
- Only data necessary for integration delivery is collected
- Retention limited to operational necessity (max 48 hours)
- No secondary data usage or analysis
Right to Erasure
Due to automatic deletion:
- Most erasure requests satisfied automatically within 60 minutes (successful events)
- Failed events erased within 48 hours maximum
- No long-term storage requiring manual deletion procedures
Data Processing Records
Available for audit:
- TTL deletion metrics from MongoDB
- Aggregate delivery success/failure statistics
- System uptime and recovery events
- Access control logs
Not Available (by design):
- Individual event content logs
- Long-term event archives
- Customer data backups
Security Considerations for Evaluation
Strengths
✅ Automated Deletion: Database-level TTL removes human error
✅ Minimal Retention: 60-minute maximum for successful processing
✅ Zero Engineering Access: Technical enforcement prevents PII exposure
✅ Dedicated Infrastructure: Available for enhanced isolation
✅ Self-Healing: Reduces manual intervention and access requirements
Limitations
⚠️ 48-Hour Failure Window: Failed events retained up to 48 hours for retry logic
⚠️ Third-Party Delivery: Data security depends on integration endpoint security after delivery
⚠️ Shared Infrastructure: Standard plans use multi-tenant architecture (mitigated by TTL)
Risk Assessment
Data Breach Risk: Low
- Minimal retention window reduces exposure
- TTL ensures data doesn’t accumulate
- No long-term storage to compromise
Data Loss Risk: Medium
- Failed events deleted after 48 hours (acceptable for analytics data)
- No backup retention by design
- Client assumes risk for unrecoverable delivery failures
Compliance Risk: Low
- Automated deletion supports data minimization requirements
- No long-term retention to manage
- Clear data lifecycle for audit purposes
Technical Specifications Summary
| Component | Specification | 
|---|---|
| Runtime | Node.js v22 | 
| Database | MongoDB with TTL indexes | 
| Successful Event Retention | 60 minutes maximum | 
| Failed Event Retention | 48 hours maximum | 
| TTL Monitor Frequency | Every 60 seconds | 
| Retry Attempts (Initial) | 3 within 60 seconds | 
| Retry Attempts (DLQ) | 3 over 48 hours | 
| Engineering Data Access | Metrics only, no PII | 
| Dedicated Infrastructure | Premium+ plans | 
| Self-Healing | Automated restart and recovery | 
Questions for Security Review
- Data Classification: What is the sensitivity classification of analytics event data in your organization?
- Retention Requirements: Do you have minimum data retention requirements that conflict with automatic deletion?
- Compliance Mandates: Are there specific regulatory frameworks (HIPAA, PCI-DSS, GDPR) requiring dedicated infrastructure?
- Incident Response: What are your requirements for forensic analysis in case of security incidents?
- Third-Party Risk: What is your process for evaluating security of integration endpoints (GA4, Facebook, etc.)?
Contact for Technical Security Questions
For detailed technical discussions, architecture reviews, or compliance documentation:
Security Team: security@seresa.io
Technical Documentation: docs.seresa.io
Compliance Inquiries: support@seresa.io
Evaluation: 3-Day Technical Trial
Trial Includes:
- Full access to Premium features including dedicated server option
- Complete API documentation and integration guides
- Technical support for security team evaluation
- Compliance documentation package
No Credit Card Required
This document is maintained by Seresa security engineering. Last reviewed: October 20, 2025




