Skip to main content
Last reviewed: March 5, 2026 Owner: Security + Engineering Review cadence: Quarterly Status: Implemented This page describes the network baseline for integrations, including TLS, edge protections, and deployment-dependent connectivity options.

What this page answers

  • How traffic reaches Tero and where TLS is terminated
  • Which WAF and DDoS controls protect hosted endpoints
  • What network restriction options are supported for enterprise deployments

Current state (as of March 5, 2026)

Hosted APIs are exposed through controlled public endpoints behind Cloudflare edge protections. Self-hosted deployments are customer-controlled for perimeter and routing policy.

Network path diagram

Connectivity baseline

TopicTero-hostedSelf-hosted
Integration directionalityCustomer-initiated outbound API callsCustomer-defined
Inbound into customer environmentNot required for baseline integrationCustomer-defined
Private connectivity modelAvailable based on enterprise requirementsCustomer-managed
Destination restrictionsAllowlisting support for enterprise integrationsCustomer-managed

Edge protection model (hosted)

Control areaImplementation
WAF and L7 protectionsCloudflare-managed WAF rules and request controls
DDoS protectionCloudflare network and application-layer DDoS protections
MonitoringEdge and application telemetry monitored for anomalous traffic patterns
Rule and change managementRule changes follow controlled change workflows and validation before production rollout

Traffic and termination model

PathTero-hostedSelf-hosted
External API trafficHTTPS to Tero-managed endpointsCustomer-defined ingress path
TLS terminationHosted edge reverse-proxy layerCustomer-defined termination model
Service-to-service trafficManaged cloud network segmentation and service boundariesCustomer networking controls

Evidence you can request

TopicPrimary evidence
Architecture boundarySecurity Architecture
Ownership splitShared Responsibility
Encryption detailsEncryption and Key Management

Exceptions and governance

Any network-control exception requires documented risk, compensating controls, and a target remediation date. Evidence requests: