Openness in Practice
Amos delivers true control over your fund’s data platform through strategic open source components and transparent practices. Unlike traditional vendors who create dependency through proprietary systems, Amos ensures you maintain ownership and control of your data infrastructure.Source Code Control
Critical components are open source, giving you full visibility and control over your data platform’s core functionality.
No Vendor Lock-in
Standard tooling and reversible deployment ensure you’re never trapped by proprietary dependencies.
Full Auditability
Version-controlled configurations and end-to-end lineage provide complete transparency for regulatory compliance.
Future Optionality
Open architecture preserves your ability to adapt, extend, or migrate as your needs evolve.
What Components Are Open
Amos strategically open sources the components that matter most for client control and long-term flexibility:Data Connectors & Pipelines
- Source Code Location: GitHub - Amos Connectors
- Client Control: Full source code access, ability to modify and extend
- What’s Included: All fund administration, CRM, and portfolio management system connectors
Deployment Infrastructure as Code (IaC)
- Source Code Location: GitHub - Amos Deploy
- Client Control: Complete deployment automation, infrastructure definitions
- What’s Included: Terraform modules, Kubernetes manifests, CI/CD pipelines
Data Models & Transformations
- Source Code Location: GitHub - Amos Core Models
- Client Control: Full dbt model definitions, transformation logic
- What’s Included: Canonical data model, business logic, data quality tests
Example Implementations
- Source Code Location: GitHub - Amos Examples
- Client Control: Reference implementations for common use cases
- What’s Included: Sample dashboards, report templates, integration patterns
Lock-in Surface Areas & Mitigation
Traditional data platforms create dependency through multiple lock-in mechanisms. Amos systematically addresses each:Data Custody & Retention
- Your Control: Data remains in your cloud environment (AWS, Azure, GCP)
- Standard Formats: All data stored in open formats (Parquet, Delta Lake)
- Export Capabilities: Full data export available at any time
- Retention Policies: You control data lifecycle and retention
Deployment Flexibility
- Self-Hosting Options: Deploy in your own cloud environment
- Standard Tooling: Uses Kubernetes, Terraform, and other industry standards
- Reversible Deployment: Infrastructure can be modified or removed without vendor dependency
- Multi-Cloud Support: Not tied to any specific cloud provider
Client Control Mechanisms
Version-Controlled Configurations
All system configurations are stored in Git repositories under your control:Change Management via Pull Requests
- All configuration changes go through PR review process
- Automated testing validates changes before deployment
- Full audit trail of who changed what and when
- Rollback capabilities for any configuration change
Least-Privilege Access Model
- Role-based access controls (RBAC) for all system components
- Principle of least privilege enforced at infrastructure level
- Audit logs for all access and changes
- Integration with your existing identity management systems
Regulatory & Compliance Benefits
SOC 2 & ISO 27001 Alignment
The open source approach directly supports compliance frameworks:| Control Area | Traditional Vendor | Amos Open Source |
|---|---|---|
| Access Controls | Black box, trust vendor | Full visibility, your controls |
| Change Management | Vendor-controlled | PR-based, auditable |
| Data Processing | Proprietary algorithms | Open source, reviewable |
| Incident Response | Vendor dependency | Direct control and response |
| Audit Evidence | Vendor reports | Direct system evidence |
LP Due Diligence Support
Limited Partners increasingly require transparency into fund operations:- Code Review Access: LPs can review data processing logic
- Security Posture: Open source enables independent security assessment
- Operational Resilience: No single vendor dependency reduces operational risk
- Data Governance: Full transparency into data handling practices
Secure SDLC Practices
Development Security
- Code Scanning: Automated security scanning on all commits
- Dependency Management: Regular updates and vulnerability scanning
- Secure Defaults: Security-first configuration templates
- Penetration Testing: Regular third-party security assessments
Contribution Model
While core components are open source, client-specific extensions remain private:Getting Started with Open Source Assurance
Assessment Questions
Before implementation, consider these key questions:- Control Requirements: What level of source code access do you need?
- Compliance Needs: Which regulatory frameworks must you satisfy?
- Internal Capabilities: Do you have teams to manage open source components?
- Risk Tolerance: How important is vendor independence to your strategy?
Implementation Approach
- Start with Standard Deployment: Begin with Amos-managed deployment
- Gradual Control Transfer: Progressively take control of components as needed
- Skills Development: Train internal teams on open source components
- Full Independence: Achieve complete self-hosting when ready
Next Steps
Vendor Lock-in Prevention
Learn how Amos eliminates traditional vendor dependencies
Auditability & Traceability
Understand compliance and audit capabilities
Governance & Compliance
Explore governance frameworks and contribution models
Ready to explore how open source assurance can benefit your fund? Contact our team to discuss your specific control and compliance requirements.