...
We are using various tools to access security of our application. You can see various reports and practices we follow at Security checklist Security checklist and reports can be made available on authentic request.
Database Access
Database access on aws is configured in such a way that, even application on AWS can not access database if it is not a part of designated security group.
...