Security & Compliance

We use tenant scoping, least-privilege permissions, and role-based access to protect data. All data in transit is encrypted with TLS; at rest encryption is supported by the underlying database. Audit logs record important actions.