Security
1. Architectural Overview
Logical Data Flow Diagram
[ USER / BROWSER ]
|
| (1) HTTPS Flow (First-Party)
| Domain: metrics.your-site.com
v
+-------------------------------------------------------------+
| SECURITY BUFFER ZONE (Bunny.net) |
| ----------------------------------------------------------- |
| [ CDN / EDGE ] <-- SSL Termination & Optimization |
| [ WAF ] <-- Filtering (Anti-DDoS, Bad Bots) |
| |
| * Config: Global (Performance) OR Tier-1 EU (Sovereignty) |
+-------------------------------------------------------------+
|
| (2) Secured Flow (Encrypted Tunnel)
| Protected Origin (Masked IP)
v
+-------------------------------------------------------------+
| PROCESSING INFRASTRUCTURE (GTM Server-Side) |
| ----------------------------------------------------------- |
| Host: SCALEWAY / HETZNER |
| Location: EUROPE (France / Germany) |
| |
| [ GTM LOGIC ] |
| -> Request Reception |
| -> Cleaning / Pseudonymization (IP, User Agent) |
| -> Enrichment (if required) |
+-------------------------------------------------------------+
|
| (3) Server-to-Server API Egress
| Controlled & Pseudonymized Data
+-----------------------+-----------------------+
| | |
v v v
[ GOOGLE GA4 ] [ META CAPI ] [ OTHER THIRD PARTIES ]
(United States) (United States) (By Vendor)2. Detailed Flow Analysis
Flow (1): Browser ↔ Bunny.net (Ingress)
Flow (2): Bunny.net ↔ GTM Servers (Internal)
Flow (3): GTM Servers ↔ Partners (Egress)
3. Data Sovereignty Strategy (Bunny.net)
4. Technical Prerequisites & Impacts
Mis à jour