Security & Compliance
Network Diagram
See how data flows through Isofold and how network boundaries are enforced.
Network Architecture
Isofold is designed to minimize surface area and enforce strict boundaries between components. Whether hosted or self-deployed, the network flow ensures:
- End-to-end encryption
- Clear ingress/egress boundaries
- Optional VPC containment
Hosted Deployment
In hosted mode, Isofold runs on Fly.io edge infrastructure.
- All inbound connections are TLS-encrypted
- Internal services are not exposed externally
- Result data is never stored
Self-Hosted Deployment
In self-hosted mode, all traffic stays within your network perimeter:
- TLS is optional but recommended
- No traffic exits your infrastructure
- Logging and metrics are fully under your control
Perimeter Recommendations
To maximize security in any deployment:
- Terminate TLS at the proxy or upstream load balancer
- Deploy the proxy close to the warehouse (same region or VPC)
- Use DNS-based routing to isolate team environments
- Audit connections using your existing observability stack
Data Egress Considerations
- BigQuery: Isofold calls Google APIs on your behalf. Use service account scoping and allowlisting.
- Snowflake: Proxy acts as a passthrough; no state is stored.
- Aurora: Use internal DNS routing and security groups to ensure isolation.
Looking for more on pricing and cost insights? Continue to Billing & Reports