How Serpentua Cloud Works (For IT Professionals)
System Architecture for IT Professioanals
beginnerFebruary 25, 2026
On-Premise — Files never leave this zone
🗄️
Step 01
Attached Storage
Raw file storage connected to the server appliance
💾
SAN
Storage Area Network
📦
NAS
Network Attached Storage
🔲
JBOD
Just a Bunch of Disks
🖥️
Step 02
Storage Server Appliance
Host server with direct access to attached storage
🐧 Ubuntu / Linux
🪟 Windows Server
😈 FreeBSD
🍎 macOS
😈 OpenBSD / NetBSD
⚙️
Step 03
Serpentua Agent
Installed on the server. Runs on a schedule, traverses all mounted storage and computes a cryptographic hash for every file. No file data ever leaves the machine.
<200MB installed
Scheduled scans
Background operation
SHA-256
SHA-512
MD5
Zero file transfer
🔒 TLS 1.3 · Certificate Pinning · API Key Auth
📤 Outbound payload:
SHA-256
SHA-512
MD5
—
☁️ Serpentua Cloud · 99.99% Uptime
📡
Step 04
API Server — Ingestion
Receives the encrypted hash payload. Authenticates the agent via API key and validates the transmission.
RESTful API
API key auth
Unlimited concurrent agents
⚡
Step 05
Validation Engine
Compares incoming hashes against stored baseline records. Detects file corruption, unexpected modifications, new files, and deletions.
Baseline comparison
SHA-256 · SHA-512 · MD5
Corruption detection
NIST IR 8387 compliant
🗃️
Step 06
Record Storage & Audit Ledger
All validation results are written to a tamper-evident cloud ledger — a permanent, time-stamped record of every file's integrity state.
Tamper-evident ledger
Historical records
Configurable retention
Indefinite storage available
📤 Secure report delivery — on demand or scheduled
👤 Client Access — View from anywhere
🌐
Step 07
Client Dashboard & Reports
Access validation results, alerts, and downloadable reports from any browser — no software required.
📊
Live Dashboard
Real-time metrics, agent health, file integrity status
🔔
Alerts
Instant email or webhook on corruption or anomaly
📥
Download Reports
PDF · CSV audit trails for compliance & legal review
On-premise — no file transfer
Hash computation only
Encrypted transmission & cloud
Client access & reports