Security Controls

Our security controls organized by category

Last updated

Cloud Infrastructure

All services hosted on EU-based infrastructure

Implemented

Data Encryption at Rest

All data encrypted using AES-256

Implemented

Data Encryption in Transit

All connections use TLS 1.3

Implemented

Database Security

Supabase PostgreSQL with Row Level Security (RLS)

Implemented

File Storage Security

Google Cloud Storage with signed URLs (7-day expiry)

Implemented

DDoS Protection

Cloudflare/Vercel edge protection

Implemented

Secure API Design

All API routes require authentication

Implemented

Security Responsibility

Dedicated security oversight

Implemented

Vendor Risk Management

All vendors reviewed for security compliance

Implemented

Security Awareness

Regular security best practices review

Implemented

Authentication

Supabase Auth with email verification

Implemented

Session Management

Secure session handling with token refresh

Implemented

Password Requirements

Minimum strength requirements enforced

Implemented

OAuth Integration

Google and GitHub SSO options

Implemented

Rate Limiting

API rate limiting to prevent abuse

Implemented

Input Validation

Server-side validation on all inputs

Implemented

CSRF Protection

Built-in Next.js CSRF protections

Implemented

Code Review

All changes reviewed before deployment

Implemented

Dependency Management

Regular dependency updates and audits

Implemented

Error Monitoring

Sentry integration for error tracking

Implemented

Logging

Application logging for security events

Implemented

Incident Response

Defined process for security incidents

Implemented

GDPR Compliance

Full GDPR compliance for EU users

Implemented

Data Minimization

Only collect necessary data

Implemented

Data Retention

User data deleted within 30 days of account deletion

Implemented

User Data Export

Users can export their data

Implemented

Account Deletion

Users can delete their account and data

Implemented

Cookie Consent

Cookie consent banner with preferences

Implemented

Privacy Policy

Comprehensive privacy policy published

Implemented

Terms of Service

Clear terms of service published

Implemented

SOC 2 Type II

Third-party security audit certification

Planned

ISO 27001

Information security management certification

Planned