Docs
  • Solver
  • Models
    • Field Service Routing
    • Employee Shift Scheduling
  • Platform
Try models
  • Timefold Platform
  • Trust
  • Data security

Timefold Platform

    • Introduction
    • Planning AI concepts
    • Getting started with the Timefold Platform
    • Platform concepts
    • Models
      • Model catalog and documentation
      • Model versioning and maturity
      • Trialing Timefold models
    • How-tos
      • Interpreting model run results
      • Configuration parameters and profiles
      • Searching and categorizing runs for auditability
      • Member management and roles
    • Job-oriented guides
      • Balancing different optimization goals
      • Validating an optimized plan with Explainable AI
      • Uncovering inefficiencies in operational planning
      • Responding to disruptions with real-time replanning
      • Designing better routing plans with (just enough) traffic awareness
    • API integration
      • API usage
      • Webhooks
    • Changelog
    • Feature requests
    • Self-Hosted
      • Self-Hosted vs. Timefold Cloud Platform
      • Installation instructions
      • Maps service
      • Troubleshooting
    • Trust
      • Risk profile
      • Product security
      • Data security
      • Legal and privacy

Data security

Timefold is committed to your data privacy and security. This guide explains how we keep the data stored and processed in the Timefold Cloud Platform safe.

Access monitoring

Timefold ensures the network, infrastructure, and data access for Timefold Cloud Platform are secured and monitored. This includes continuous system monitoring for issues that might signal security concerns, strict access control measures based on the principle of least privilege, and robust log management where activities are logged and periodically reviewed.

Data backups

Critical tenant data is automatically backed up using MongoDB Atlas, with the following safeguards:

  • Backups are encrypted at rest.

  • Backup processes are automatically monitored for completion and exceptions, and anomalies are reported to the security team.

Data separation

The Timefold Cloud Platform is a multi-tenant environment. Data from different tenants is separated at the database level and application level, ensuring that information from one tenant is unavailable to other tenants.

Encryption-at-rest

Data is stored in encrypted format using AES-256 encryption, ensuring that sensitive information remains secure and protected from unauthorized access while at rest.

Encryption-in-transit

All data transmitted to and from the Timefold Cloud Platform is encrypted.

  • Protocols: HTTPS, SSL/TLS, and SSH are used to secure data in transit.

  • TLS details: Certificates use SHA-256 with ECDSA and EC 256-bit keys.

  • Certificate management: TLS certificates are issued and rotated automatically using Google Certificate Authority Service and Let’s Encrypt, managed with Kubernetes tools like cert-manager.

Physical security

Facilities hosting the Timefold Cloud Platform and hardware are managed mainly by GCP, which utilizes certified data centers. Physical access to these data centers is strictly controlled and monitored, with no Timefold employees granted physical access.

Network security

  • DDoS protection: All external traffic to Timefold is routed through Cloudflare, providing protection against denial-of-service (DDoS) attacks.

  • Firewalls:

    • All outbound and inbound traffic passes through firewall layers.

    • Public-facing services are protected by Google Cloud Firewalls and Cloudflare Web Application Firewall (WAF), defending against Layer 3–7 attacks, including SQL injection and buffer overflows.

    • Backend services are isolated in private subnets with no direct internet access.

  • Firewall management:

    • Firewall configurations are managed as code using Terraform.

    • Changes are made through peer-reviewed pull requests and are fully logged for auditability, ensuring traceability and consistency across environments.

  • Infrastructure architecture:

    • Public-facing APIs and SaaS frontends are hosted on Google Kubernetes Engine (GKE), behind Google Cloud Load Balancers.

    • Access to services is tightly controlled via firewall rules, identity-aware proxies, and ingress gateways.

    • Only essential endpoints are exposed publicly.

Vulnerability management

Timefold maintains a comprehensive vulnerability management program.

  • Tooling:

    • Aikido is used for vulnerability scanning and authenticated Dynamic Application Security Testing (DAST) on production systems.

    • GitHub is used for static code analysis and dependency scanning across repositories.

    • Vanta agent is installed on employee laptops to monitor device security posture, ensuring compliance with company policies and security standards.

  • Frequency: Vulnerability scans are automated and performed daily.

  • © 2025 Timefold BV
  • Timefold.ai
  • Documentation
  • Changelog
  • Send feedback
  • Privacy
  • Legal
    • Light mode
    • Dark mode
    • System default