Thru Network Security Architecture
Technical Documentation
Introduction
This document details the security practices at Thru to ensure data stored and transferred by Thru meets the highest standards to minimize risk and exposure.
We follow the zero-trust security model and adhere to the following frameworks and certifications: NIST, SOC2 and ISO/IEC 27001.
Thru is hosted in Microsoft Azure data centers and we adhere to a defense in depth (DiD) model outlined in the document.