...
We are using various tools to access security of our application. Security checklist and reports can be made available on authentic request.
Database Access
Database access on aws is configured in such a way that, even application on AWS can not access database if it is not a part of designated security group.
...