Security architecture overview

Core safeguards that keep workforce, access, and surveillance operations controlled at enterprise scale.

Control principles

  • Tenant isolation across auth, API access, and persistence paths
  • Role-based controls for owner, admin, partner, staff, and employee contexts
  • License and module entitlement gates before mutation endpoints
  • Encrypted secret storage for device and integration credentials
  • Structured audit events for privileged and high-risk operations

Transport and headers

  • Strict content security and framing restrictions.
  • Referrer and permissions policies set for least privilege behavior.
  • Session rotation and protected support-session token controls.