Security First

Built with enterprise-grade security from the ground up

Encryption at Rest

All credentials and secrets are encrypted using AES-256 with key rotation support. Keys are stored separately and rotated regularly.

Role-Based Access

Fine-grained permissions let you control exactly who can do what. Admin, Member, and Viewer roles with customizable permissions.

Approval Workflows

Dangerous actions require approval. Optional two-person rule ensures the requester can't approve their own changes.

Comprehensive Audit Logs

Every action is logged with timestamp, actor, IP, and details. Configurable retention up to 365 days.

Tenant Isolation

Complete data isolation between tenants. No cross-tenant access in queries, search, or logs.

API Token Security

Bearer tokens with scopes, expiration, and optional IP allowlists. Tokens are hashed before storage.