Every credential, every payload, every journal posting is engineered for an audit trail you can hand to a regulator. Here's the short version of what that means.
Field-level encryption for PII and tokens using libsodium secretbox. Searchable fields use HMAC-SHA256 blind indexes.
TLS 1.2+ required. HSTS preloadable. Internal service mesh communication is mTLS where applicable.
Card numbers never touch our database. Payments tokenise via gateway (Stripe/Adyen/Auth.net), we store only brand + last4 + fingerprint.
Memory-hard hashing with auto-rehash on policy change. Per-account and per-IP lockout. Timing-safe verification.
TOTP enrolment with manual secret entry. No third-party QR generation (your secret stays on our servers).
Enterprise tier supports SAML 2.0 and OAuth/OIDC. Group-to-role mapping is JSON-configured.
Every audit row links to its predecessor via SHA-256. Nightly cron walks the chain and alerts on breaks.
Every query is tenant-scoped. Hash chains never cross tenants. Audit chains never cross tenants. Period locks never cross tenants.
Granular permissions per role. Branch-scoped role assignments. Sensitive operations require approval workflows.
Content-Security-Policy, X-Content-Type-Options, Referrer-PolicySecurity::e()For deep-dive whitepapers, penetration test summaries or our SOC 2 readiness package, contact us.