Security Practices
Last updated: April 17, 2026
Our Philosophy
At Torziva Sync, security isn't just an afterthought—it's foundational to our infrastructure. Since our platform handles real-time data bridging for production systems, we treat our attack surface with extreme rigor. This page outlines our security standards and practices.
Data Center & Infrastructure Security
Our infrastructure is hosted on top-tier cloud providers who maintain compliance with ISO 27001, SOC 2 Type II, and PCI-DSS.
- Physical Security: Data centers utilize strict physical access parameters, biometrics, and 24/7 guarded surveillance.
- Network Isolation: Database instances reside in private subnets with strictly limited VPC peering. Direct external internet access to databases is prohibited.
- DDoS Protection: Global edge caching and dynamic DDoS mitigation shields thwart volumetric attacks before they reach our core compute layer.
Data Encryption
Your data is secured using industry-standard cryptography throughout its lifecycle.
- In Transit: All communications between clients, Edge nodes, and origin servers are encrypted using TLS 1.3/1.2 protocols and modern cipher suites.
- At Rest: All databases, storage volumes, and backups are encrypted at rest using AES-256 block-level encryption.
Authentication & Authorization
Robust identity management forms the core of Torziva Sync tenant isolation:
- API Keys: Authentication to our API relies on cryptographically strong asymmetric key pairing. Secret keys are hashed natively (bcrypt) and are impossible to un-hash in the event of a breach.
- Row-Level Security (RLS): Every query executed against our primary database runs against strict Postgres RLS policies, ensuring customers physically cannot query data outside their explicit organization IDs.
- Password Hashing: Dashboard passwords are salted and hashed natively using modern standards. We do not support legacy hashing protocols.
Compliance & Vulnerability Management
Our engineering team practices continuous security monitoring:
- Routine static analysis (SAST) and software composition analysis on all code pushes.
- Third-party penetration testing is conducted annually against staging environments.
- We actively monitor dependency trees and patch high-severity CVEs within a 24-hour SLA.
Incident Response & Reporting
We maintain a rigorous incident response playbook designed to quickly identify, contain, and mitigate security threats. In the event of a material data breach, affected users will be notified within 72 hours via the email tied to their account, along with an ongoing post-mortem detailing remediation efforts.
If you believe you have discovered a vulnerability on our platform, we strongly encourage you to disclose it responsibly by contacting support@torziva.site.