Security architecture overview
Core safeguards that keep workforce, access, and surveillance operations controlled at enterprise scale.
Control principles
- Tenant isolation across auth, API access, and persistence paths
- Role-based controls for owner, admin, partner, staff, and employee contexts
- License and module entitlement gates before mutation endpoints
- Encrypted secret storage for device and integration credentials
- Structured audit events for privileged and high-risk operations
Transport and headers
- Strict content security and framing restrictions.
- Referrer and permissions policies set for least privilege behavior.
- Session rotation and protected support-session token controls.