技術與安全

Cloud Infrastructure (IBM SoftLayer / IBM Cloud)
Our core system is deployed on IBM SoftLayer (IBM Cloud Infrastructure). This cloud platform features global high availability, rigorous information security governance, and comprehensive compliance management. The underlying environment for system operations complies with multiple international information security and quality management standards, including:
ISO/IEC 27001 – Information Security Management
ISO/IEC 27017 – Cloud Service Security Controls
ISO/IEC 27018 – PII Protection in Public Clouds
ISO 9001 – Quality Management System
ISO 27701 – Privacy Information Management (PIMS)
ISO 31000 – Risk Management Guidelines
In addition, the IBM Office of the CISO continuously provides security strategies, policies, and control mechanisms to strengthen the overall compliance and security resilience of the system.
Database Architecture and PII Protection
To ensure high security during the processing of personal and operational data, we adopt data layering and permission isolation architectures commonly used by financial institutions, implemented with strict control principles:
Independent separation management of member personal databases
Layered isolation design for system data and service data
Only authorized system modules can access PII
Adherence to the Principle of Least Privilege
These measures effectively reduce data interaction risks and enhance the security and compliance of information processing workflows.
Secure Transmission and Network Protection
Enterprise-grade SSL Certificates
All data transmission uses TLS/SSL encryption protocols to ensure data in transit is protected from detection, tampering, and interception, maintaining the integrity and confidentiality of information exchange.
Cloudflare Cloud Protection
Our services (including the Booking System and Hourly Booking System) use Cloudflare security layers for traffic pre-filtering and possess the following network security capabilities:
- Global DDoS Attack Mitigation
- Malicious Traffic Identification and Blocking
- WAF (Web Application Firewall) Application Layer Protection
This protection mechanism ensures that only legitimate and trusted traffic can enter the host environment.


Host-side Security Measures
Our host environment is planned and managed according to enterprise-grade information security standards and configured with the following mechanisms:
- Real-time Antivirus and Endpoint Security Monitoring
- IPaaS Threat Forensics Service to detect and block suspicious behavior
- Regular Vulnerability Scanning and Patching
- Continuous Updates and Version Control
These measures ensure Business Continuity and System Resilience.
Multi-layer Security Architecture
We adopt a multi-layer information security governance architecture, covering:
- Cloud Infrastructure Security (IBM)
- Application Layer Security (WAF / Cloudflare)
- Database Layering and Permission Isolation Mechanisms
- Identity Verification and Role-Based Access Control (RBAC)
- Real-time Threat Detection and Forensics (IPaaS)
- Endpoint Protection (Antivirus / System Updates)
Through this multi-layer protection architecture, we ensure that all services operate in a highly controlled and compliant environment, providing customers with secure, stable, and trustworthy service quality.
