Infrastructure Encryption Access Controls Application Security Monitoring Organizational Data Handling Compliance
🖥
Infrastructure Security
ControlDetailStatus
Cloud ProviderDigitalOcean (SOC 2 Type II, ISO 27001 certified)Active (DO)
Data Center RegionUS-based data centers (NYC / SFO regions)Active (DO)
Physical SecurityDigitalOcean-managed; biometric access controls, 24/7 on-site security, CCTV monitoringActive (DO)
Network FirewallDigitalOcean Cloud Firewall with allowlist-only ingress rulesActive (DO)
DDoS ProtectionVolumetric DDoS mitigation included with DigitalOcean infrastructureActive (DO)
Infrastructure RedundancyRedundant networking and power within DigitalOcean data centersActive (DO)
Automated BackupsDaily database snapshots retained for 30 daysActive (Torgix)
Backup EncryptionBackups encrypted at rest using AES-256Active (Torgix)
Disaster RecoveryRTO target < 4 hours; RPO target < 24 hours; annual DR testActive (Torgix)
Vulnerability ScanningAutomated infrastructure vulnerability scanning (quarterly)Planned
Penetration TestingThird-party penetration test (annual)Planned
🔐
Data Encryption
ControlDetailStatus
Encryption at RestAES-256 encryption for all stored data including database volumes and backupsActive (DO)
Encryption in TransitTLS 1.2 minimum, TLS 1.3 preferred, for all client-server communicationActive (Torgix)
SSL / TLS CertificatesLet's Encrypt certificates with auto-renewal; A+ rating target on SSL LabsActive (Torgix)
Key ManagementEncryption keys managed by DigitalOcean; application secrets managed via environment variablesActive (DO)
Password HashingUser passwords hashed using bcrypt with salt (minimum cost factor 12)Active (Torgix)
Customer-Managed Keys (CMK)Option for enterprise customers to supply their own encryption keysPlanned
Field-Level EncryptionSelective field-level encryption for highly sensitive data fieldsPlanned
🔑
Access Controls
ControlDetailStatus
Role-Based Access Control (RBAC)Granular roles (Admin, Manager, Technician, Viewer) enforced at API and UI layerActive (Torgix)
Multi-Tenant Data IsolationEach customer's data is logically isolated; cross-tenant queries are architecturally preventedActive (Torgix)
Session ManagementSecure, time-limited session tokens; automatic timeout after inactivityActive (Torgix)
API Key ManagementScoped API keys with per-key permissions, expiration, and revocationActive (Torgix)
Multi-Factor Authentication (MFA)TOTP-based MFA available for all user accountsPlanned
SSO / SAML IntegrationEnterprise SSO via SAML 2.0 / OIDC (Okta, Azure AD, Google Workspace)Planned
Privileged Access ManagementJust-in-time access for production infrastructure; access logged and time-limitedPlanned
IP AllowlistingEnterprise option to restrict platform access to approved IP rangesPlanned
🛡
Product & Application Security
ControlDetailStatus
Input ValidationAll API inputs validated and sanitized; parameterized queries to prevent SQL injectionActive (Torgix)
OWASP Top 10 MitigationDevelopment practices and code review aligned to OWASP Top 10 risksActive (Torgix)
Dependency ScanningAutomated scanning of third-party libraries for known CVEs (GitHub Dependabot)Active (Torgix)
Secure SDLCSecurity review integrated into sprint planning and pull request processActive (Torgix)
Rate Limiting & ThrottlingAPI rate limiting to prevent abuse; per-key and per-IP throttlingActive (Torgix)
Static Application Security Testing (SAST)Automated SAST scanning integrated into CI/CD pipelinePlanned
Bug Bounty ProgramManaged bug bounty program for responsible disclosure of security vulnerabilitiesPlanned
WAF (Web Application Firewall)WAF deployment to filter malicious HTTP trafficPlanned
🚨
Monitoring & Incident Response
ControlDetailStatus
Infrastructure Monitoring24/7 uptime and performance monitoring with automated alertingActive (DO)
Application Error MonitoringReal-time error tracking and alerting for application exceptionsActive (Torgix)
Audit LoggingAll user actions and API calls logged with timestamp, user ID, and IP; retained 90 daysActive (Torgix)
Incident Response PlanDocumented IRP with defined severity levels, escalation paths, and communication templatesActive (Torgix)
Breach NotificationAffected customers notified within 72 hours of confirmed breach detectionActive (Torgix)
SIEM IntegrationSecurity Information and Event Management platform for correlated threat detectionPlanned
Security Operations Center (SOC)24/7 SOC monitoring for enterprise tier customersPlanned
Tabletop ExercisesAnnual incident response tabletop exercise with cross-functional teamPlanned
👥
Organizational Security
ControlDetailStatus
Security PoliciesDocumented information security policies reviewed and approved annuallyActive (Torgix)
Acceptable Use PolicyAUP covering company systems, data handling, and customer data access restrictionsActive (Torgix)
Security Awareness TrainingAnnual mandatory security training for all employees; phishing simulation trainingPlanned
Background ChecksBackground screening for all new employees prior to access provisioningPlanned
NDAs & ConfidentialityAll employees and contractors sign confidentiality agreements upon engagementPlanned
Vendor Risk ManagementSecurity review of third-party vendors and sub-processors with access to customer dataPlanned
Offboarding ProceduresAutomated deprovisioning of access within 24 hours of employee departurePlanned
Security CommitteeCross-functional security committee with quarterly review cadencePlanned
Cyber InsuranceCyber liability insurance policy in forceN/A
📂
Data Handling & Privacy
ControlDetailStatus
Data Classification PolicyFour-tier classification: Public, Internal, Confidential, Restricted, with handling requirements per tierActive (Torgix)
Customer Data OwnershipCustomers retain full ownership of their data; Torgix uses it only for service deliveryActive (Torgix)
Data RetentionCustomer data retained for the contract term plus 30 days post-termination, then securely purgedActive (Torgix)
Right to DeletionCustomers may request full data deletion; fulfilled within 30 days of verified requestActive (Torgix)
Data PortabilityCustomers can export all their data in standard formats (CSV, JSON) at any timeActive (Torgix)
Privacy PolicyPublished privacy policy covering data collection, use, retention, rights, and third-party sharingActive (Torgix)
Sub-Processor DisclosureList of sub-processors maintained and disclosed to customers upon requestActive (Torgix)
CCPA ComplianceProcesses to honor CCPA rights requests (access, deletion, opt-out of sale)Planned
GDPR / Data Processing Agreement (DPA)DPA available for EU customers; standard contractual clauses for international data transfersPlanned
📋
Compliance & Certifications
SOC 2 Type II  Active (DO)
DigitalOcean infrastructure is SOC 2 Type II certified, covering security, availability, and confidentiality trust service criteria.
ISO 27001  Active (DO)
DigitalOcean holds ISO 27001 certification for its information security management system.
PCI DSS  Active (DO)
DigitalOcean infrastructure is PCI DSS compliant for payment card data environments.
GDPR  Active (DO)
DigitalOcean is GDPR compliant with data processing agreements and EU Standard Contractual Clauses available.
Certification / FrameworkScopeStatus
SOC 2 Type II (Torgix)Torgix platform-level SOC 2 audit covering security and availability trust service criteriaPlanned
HIPAABusiness Associate Agreements and HIPAA-required safeguards for healthcare customersPlanned
FedRAMPFedRAMP authorization for US federal government customersPlanned
NIST CSF AlignmentInternal controls mapped to NIST Cybersecurity Framework (Identify, Protect, Detect, Respond, Recover)Planned

📩 Report a Security Issue

We take security reports seriously. If you discover a potential vulnerability in Torgix, please contact us at security@torgix.ai.

  • Acknowledgement within 48 hours
  • Status update within 5 business days
  • We do not pursue legal action against good-faith researchers

📞 Security & Privacy Contacts

Security issues: security@torgix.ai

Privacy requests: privacy@torgix.ai

Infrastructure trust: DigitalOcean Trust Center ↗

This document is reviewed quarterly or upon material change.

Last reviewed: May 2026 • Torgix, Inc. • Privacy PolicyTerms of Service