Skip to main content
Skip table of contents

17. Customer Controls and Responsibilities

Thru empowers customers with a suite of security features and tools to enhance their control over data protection and compliance. Our Managed File Transfer service operates under a shared responsibility model, outlining clear roles for both Thru and our customers in maintaining a secure environment.

17.1      Available Security Features for Customers

Thru provides a range of security features that customers can leverage to protect their data and manage access:

  • Role-Based Access Control (RBAC): Customers can define and enforce user roles and permissions, ensuring that access to data and system functionalities is restricted based on the principle of least privilege.

  • Multi-Factor Authentication (MFA): To enhance account security, customers can enable MFA, requiring users to verify their identity using multiple authentication methods before accessing the system.

  • Customizable Security Policies: Customers can set and manage security policies tailored to their organizational requirements, such as password complexity, session timeout settings, and data retention rules.

  • Encryption Management: Customers have control over encryption settings, allowing them to manage encryption keys and policies to ensure that data remains secure both at rest and in transit (End-to-end Encryption.)

  • Audit Logs and Monitoring: Customers can access detailed audit logs and monitoring tools to track user activities, identify potential security incidents, and ensure compliance with internal policies and external regulations.

  • IP Whitelisting and Geofencing: These features enable customers to restrict access to their accounts from specific IP addresses, further enhancing security.

17.2      Shared Responsibility Model

Thru operates under a shared responsibility model, where security responsibilities are divided between Thru and our customers. This model ensures comprehensive protection while allowing customers to maintain control over their specific security needs.

17.2.1     Thru's Responsibilities:

  • Infrastructure Security: Thru manages the security of the cloud infrastructure, including physical data centers, hardware, and network components, ensuring a secure foundation for our services.

  • Platform Security: We maintain the security of the Managed File Transfer service platform, implementing updates, patches, and security configurations to protect against vulnerabilities and threats.

  • Compliance: Thru ensures that the service meets relevant industry standards and regulations, providing customers with a compliant and secure environment.

17.2.2     Customer's Responsibilities:

  • Data Security: Customers are responsible for securing the data they upload and manage within the service, including encryption, access controls, and compliance with data protection regulations.

  • User Management: Customers must manage user accounts, permissions, and authentication settings to ensure that access to their data and systems is appropriately restricted.

  • Security Configuration: Customers should configure and monitor available security features, such as RBAC and MFA, to align with their internal security policies and risk management strategies.

By understanding and embracing the shared responsibility model, customers can effectively collaborate with Thru to maintain a secure and resilient Managed File Transfer environment. This partnership ensures that both Thru and our customers work together to address security challenges and protect valuable data assets.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.