Security
Tenant isolation by Postgres RLS. Append-only audit. Encryption at rest and in flight. SOC2 Type 1 prep in progress.
Every table that holds customer data has row-level security enforced at the Postgres layer. Application code can’t accidentally cross tenant boundaries because the database refuses.
TLS 1.3 in flight. AES-256 for sensitive fields at rest (OAuth tokens, integration credentials). Postgres-managed encryption for the database tablespace.
Compliance checks, audit logs, content approvals, email sends, and CRD sync events are append-only. Database triggers reject UPDATE and DELETE for every role, including the service role.
TOTP MFA available on every account. Sessions refresh on a 1-hour cycle. Admin impersonation is read-only and time-boxed to 30 minutes with full audit.
Compliance posture