Blueprint
Architecture & Innovation
An interactive visualization of the end-to-end AWS architecture powering the NorthStar platform. Every component leverages services already in Allwyn's technology stack — this is configuration and integration, not greenfield development.
Five-Layer Architecture
Click each layer to explore its components
End-to-End Agentic Workflow
When a player signal is detected, the system autonomously reasons, retrieves context, generates a response, validates compliance, and delivers — all in under 1 second.
Signal Detection
Kinesis stream captures player behavioural event (purchase, session, deposit)
Context Retrieval
Agent queries Knowledge Base for player history, preferences, and regulatory context
Risk Assessment
SageMaker ML model scores the event against 50+ behavioural signals and player baseline
Reasoning & Planning
Bedrock AgentCore reasons about the appropriate response — intervention, engagement, or no action
Response Generation
Claude 3.5 Sonnet generates a personalised, empathetic response tailored to the player's context
Guardrail Validation
Bedrock Guardrails checks response for compliance, tone, accuracy, and regulatory alignment
Multi-Channel Delivery
Pinpoint delivers the response via the optimal channel — in-app, email, SMS, or push notification
Audit & Learning
Full interaction logged to immutable audit trail. Outcome feeds back into ML model training.
Traditional vs. GenAI Approach
Security, GDPR & Data Governance
Five-layer security architecture designed for UKGC compliance, GDPR Article 25 (Privacy by Design), and SOC 2 Type II alignment.
Data Classification
- ✓PII encrypted at rest (AES-256)
- ✓Tokenised player identifiers
- ✓Data classification: Public / Internal / Confidential / Restricted
- ✓Automated PII detection and masking in logs
Access Control
- ✓AWS IAM with least-privilege policies
- ✓SSO integration via SAML 2.0 / OIDC
- ✓Role-Based Access Control (RBAC) across all modules
- ✓Multi-factor authentication enforced
- ✓Session timeout: 15 min idle / 8 hour absolute
Data Processing
- ✓GDPR Article 25: Privacy by Design
- ✓Data residency: UK-only (eu-west-2)
- ✓Right to Erasure: automated deletion pipeline
- ✓Data retention: 7 years (regulatory) / 30 days (behavioural)
- ✓Consent management integrated with OneTrust
Network & Infrastructure
- ✓VPC isolation with private subnets
- ✓AWS WAF + Shield Advanced
- ✓API Gateway with rate limiting (10k req/s)
- ✓TLS 1.3 in transit, certificate pinning
- ✓DDoS protection for draw-night traffic spikes
Audit & Compliance
- ✓CloudTrail for all API calls
- ✓GuardDuty for threat detection
- ✓Immutable audit logs (S3 Object Lock)
- ✓SOC 2 Type II aligned controls
- ✓Quarterly penetration testing
Role-Based Access Control
Every role sees only what they need — no more, no less.
Innovation Roadmap 2026-2028
Beyond 2028: The Autonomous Lottery
The NorthStar architecture is designed to evolve. As foundation models advance, the same infrastructure supports increasingly autonomous capabilities — from self-optimizing campaigns to predictive player journeys to real-time game design feedback loops. The investment in agentic architecture today pays dividends for years to come.