You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
At Tobiko, we treat security as a firstclass citizen because we know how valuable your data assets are. Our team follows and executes security best practices across each layer of our product.
4
+
At Tobiko, we treat security as a first-class citizen because we know how valuable your data assets are. Our team follows and executes security best practices across each layer of our product.
5
5
6
6
## Tobiko Cloud Standard Deployment
7
7
8
8
Our standard Tobiko Cloud deployment consists of several components that are each responsible for different parts of the product.
9
9
10
-
Below is a diagram of the components along with their description.
10
+
Below is a diagram of the components along with their descriptions.
@@ -18,11 +18,11 @@ Below is a diagram of the components along with their description.
18
18
19
19
## Tobiko Cloud Hybrid Deployment
20
20
21
-
For some customers, our hybrid deployment option is a great fit. It provides a seamless experience with Tobiko Cloud but in your own VPC and infrastructure.
21
+
For some customers, our hybrid deployment option is a great fit. It provides a seamless experience with Tobiko Cloud but within your own VPC and infrastructure.
22
22
23
23
In a hybrid deployment, Tobiko Cloud does not execute tasks directly with the engine. Instead, it passes tasks to the executors hosted in your environment, which then execute the tasks with the engine.
24
24
25
-
Executors are Docker containers that connect to both Tobiko Cloud and your SQL engine. They pull work tasks from the Tobiko Cloud scheduler and execute them with your SQL engine. This is a pull-only mechanism authenicated through an OAuth Client ID/Secret. Whitelist IPs in your network to allow reaching Tobiko Cloud IPs from the executor: 34.28.17.91, 34.136.27.153, 34.136.131.20
25
+
Executors are Docker containers that connect to both Tobiko Cloud and your SQL engine. They pull work tasks from the Tobiko Cloud scheduler and execute them with your SQL engine. This is a pull-only mechanism authenticated through an OAuth Client ID/Secret. Whitelist IPs in your network to allow reaching Tobiko Cloud IPs from the executor: 34.28.17.91, 34.136.27.153, 34.136.131.20
26
26
27
27
Below is a diagram of the components along with their description.
28
28
@@ -36,17 +36,17 @@ Below is a diagram of the components along with their description.
36
36
37
37
## Internal Code Practices
38
38
39
-
Our coding standards are guidelines we enforce throughout the organization to write, maintain, and collaborate on code effecively. These practice ensure consistency, maintainability, realibility, and most importantly, trust.
39
+
Our coding standards are guidelines we enforce throughout the organization to write, maintain, and collaborate on code effectively. These practice ensure consistency, maintainability, reliability, and most importantly, trust.
40
40
41
41
Below you will find a few examples of our interal code requirements.
42
42
43
-
- We have signed commits, required approvers, and signed docker artifacts.
44
-
- Each commit to main is approved by someone different than the author.
45
-
- We follow the standard of signing commits and then registering the key with GitHub. [Github Docs](https://docs.github.com/en/authentication/managing-commit-signature-verification/signing-commits)
43
+
- We used signed commits, required approvers, and signed Docker artifacts.
44
+
- Each commit to main must be approved by someone other than the author.
45
+
- We follow the standard of signing commits and registering the key with GitHub. [Github Docs](https://docs.github.com/en/authentication/managing-commit-signature-verification/signing-commits)
46
46
- Binary is signed using cosign and OIDC for keyless. [Signing docs](https://docs.sigstore.dev/cosign/signing/overview/)
47
-
- Attestations are created that certify an image. We us GCP Binary Authorization to enforce this. [Attestation docs](https://cloud.google.com/binary-authorization/docs/key-concepts#attestations)
48
-
- Encryption is a key feature of our security posture as well. This is enforced at each stage of access. For example, the state database automatically encrypts all data. Credentials are also securely encrypted and stored.
49
-
- We backup each state database nightly as well as before upgrades. These are stored indefinitely.
47
+
- Attestations are created to certify an image. We use GCP Binary Authorization to enforce this. [Attestation docs](https://cloud.google.com/binary-authorization/docs/key-concepts#attestations)
48
+
- Encryption is a key feature of our security posture and is enforced at each stage of access. For example, the state database automatically encrypts all data. Credentials are also securely encrypted and stored.
49
+
- We back up each state database nightly and before upgrades. These backups are stored indefinitely.
50
50
51
51
52
52
## Physical Property
@@ -61,9 +61,10 @@ Revoke access for the GitHub user account associated with the compromised key an
61
61
62
62
### If someone steals a laptop, what's our continuity plan in protecting code?
63
63
64
-
- All employee devices are monitored for appropriate encryption and password policies
65
-
- Laptop protection is done through file encryption for Vanta
66
-
- Mandatory lock screen after a timeout
67
-
- We have a procedure for the disposal of an IT asset to mitigate keys being compromised through inappropriate disposal
68
-
- See above for PGP key protection
64
+
- All employee devices are monitored for proper encryption and password policies.
65
+
- Laptop protection is enforced through file encryption via Vanta.
66
+
- Mandatory lock screen after a timeout.
67
+
- We follow a formal IT asset disposal procedure to prevent key compromise through improper hardware disposal.
68
+
- See above for PGP key protection.
69
+
- Binaries are signed using Cosign and OIDC for keyless signing.
0 commit comments