Security

Your data is protected by layered security: tenant isolation, encryption, and strict access controls.

Data Isolation

Every request enforces tenant context on the server. We implement tenant-aware data access controls at the API layer and database level for defense-in-depth.

Encryption

All data is encrypted in transit (TLS) and at rest. Secrets are managed via a secure secret manager with strict rotation policies.

Access Control

Least-privilege access across services. Admin actions are auditable. API keys are hashed and tracked with prefix lookups and rotation support.

Compliance

SOC 2 readiness program is in progress. We follow secure SDLC practices and maintain logging/monitoring to detect anomalies.