Hosting Environment
Toku production infrastructure runs in United States cloud data center regions with independent SOC 2 certification coverage.
Each customer's data is logically isolated at the database level. This provides per-client data isolation, defined security boundaries, simplified audit trails, and separate access controls per customer.
Network Architecture
Production, staging, and development environments are segmented through network isolation. Direct database access from external networks is blocked.
All internal infrastructure access routes through zero-trust network access. Only authenticated, authorized devices can reach production resources, and VPN traffic is encrypted end-to-end.
Web Application Firewall & DDoS Protection
A web application firewall is deployed on all application-layer traffic entering Toku's infrastructure. The WAF provides:
- DDoS mitigation at the network and application layers
- Bot detection and automated blocking
- Rate limiting on all endpoints
- Request filtering for known attack patterns (SQLi, XSS, CSRF)
- HSTS enforcement on all public endpoints
All traffic to Toku's platform routes through the WAF before reaching application servers.
Network Segmentation
Toku enforces strict segmentation between environments:
- Production is isolated from staging and development.
- Staging mirrors production security controls but uses masked/scrubbed data.
- Development environments have production-equivalent security configurations but no connectivity to production databases.
- PII is scrubbed before any data is used in non-production environments.
Infrastructure Monitoring
Toku uses multiple monitoring layers to detect anomalies, performance issues, and security events:
- Infrastructure monitoring for performance tracking and alerting.
- Real-time application error tracking and exception monitoring.
- PII-excluded analytics and anomaly detection.
- Database logging with enhanced audit trails for all data access and modifications.
- Automated alerting on integration API failures or anomalous behavior.
- Continuous compliance monitoring to verify that infrastructure security controls operate effectively.
All monitoring systems feed into centralized alerting with an on-call escalation policy ensuring continuous coverage.
Database Security
All databases use AES-256 encryption at rest, managed through the cloud provider's key management service. Direct database access from external networks is blocked at the network level. All database queries involving sensitive data are logged.
Each client's data is logically isolated at the database level. One client's queries cannot reach another client's records.
Key Infrastructure Controls Summary
| Control | Implementation |
|---|---|
| Cloud Provider | US cloud regions with SOC 2 certification coverage |
| WAF / DDoS | Web application firewall on all ingress traffic |
| VPN | Zero-trust VPN access |
| Network Segmentation | Full isolation between prod, staging, dev |
| Database Isolation | Logical tenant isolation per client |
| Monitoring | Infrastructure monitoring, application error monitoring, database audit logs |
| External DB Access | Blocked at network level |