Security

Enterprise-Grade Security for Your Financial Data

Your financial data is protected by bank-grade security measures at every layer. From encryption to access control, we leave nothing to chance.

Security at every layer

We have built security into the foundation of our platform, not as an afterthought.

Data Encryption

All data is encrypted at rest using AES-256-GCM and in transit using TLS 1.3. Encryption keys are managed through a dedicated key management service with automatic rotation.

Tenant Isolation

Every customer gets their own isolated PostgreSQL schema. Cross-tenant data access is architecturally impossible, ensuring complete data separation.

Access Control

Role-based access control with 5 default roles: Owner, Admin, Manager, Analyst, and Viewer. Custom roles available on Enterprise plans.

Audit Logging

Every action is logged with immutable audit trails. View who did what, when, and from where. Export logs for compliance reporting.

Multi-Factor Authentication

TOTP-based two-factor authentication for all accounts. Enforced MFA policies available for teams. Support for authenticator apps.

Secure Integrations

All third-party integrations use OAuth 2.0. Credentials are encrypted and stored in a separate vault. Token refresh is automatic.

Infrastructure Security

Deployed in Docker containers with automated security patching. Daily encrypted backups with point-in-time recovery. Infrastructure as code for reproducibility.

Compliance

SOC 2 Type II compliance ready. GDPR data processing agreements available. Regular penetration testing by third-party security firms.

Compliance & Certifications

SOC 2 Type II
GDPR Compliant
AES-256 Encryption
TLS 1.3
ISO 27001 (In Progress)
99.9% SLA

Defense in Depth Architecture

Our security architecture follows the principle of defense in depth, with multiple layers of protection ensuring that no single point of failure can compromise your data.

  • Network-level firewalls and DDoS protection
  • Application-level input validation and sanitization
  • Database-level schema isolation and encryption
  • Infrastructure-level container hardening
  • Continuous monitoring and automated threat detection
Network
Application
Database

Security FAQ

Common questions about how we protect your data.

Security Whitepaper

Download our comprehensive security whitepaper for a detailed overview of our security architecture, compliance certifications, and data protection practices.

Your data security is our priority

Have questions about our security practices? Our team is happy to discuss your specific requirements.