Back to home
Trust

Security overview

High-level security posture for evaluation. Your production agreement and deployment architecture define enforceable commitments.

RBAC
Access model
TLS 1.2+
Transport
Tenant scope
Isolation
Your logs
Audit ownership

Access & identity

  • Role-based access with tenant-scoped sessions; integrate with your IdP where your deployment supports it.
  • API access should use least privilege keys and rotate credentials per your policy.

Data & transport

  • Use TLS for traffic in transit; encryption at rest depends on your database and storage configuration.
  • Backups, retention, and regional residency are deployment-specific — document them in your runbook.

Operations

  • Monitor audit trails for sensitive actions where the product exposes them.
  • Report suspected incidents through your vendor or internal security contact per your contract.