Built with security in mind
ClientFlow is engineered with strict tenant isolation, audited access controls, and modern transport security. Below is the honest list of what ships today.
Security Practices
How we keep your data safe every day.
Encryption at Rest & In Transit
Data encrypted at rest via Neon Postgres (AES-256). All traffic served over TLS 1.3.
Role-Based Access Control
Granular permissions across Owner, Admin, Manager, Member, and Client roles, enforced at every server boundary.
Tenant Isolation
Every query is scoped by organization ID at the data-access layer. Cross-tenant reads are blocked by construction.
Audit Logging
Every privileged action writes to an immutable audit log with actor, IP, user-agent, and before/after snapshots.
Multi-Factor Authentication
TOTP-based two-factor authentication available to every user. Google OAuth sign-in supported.
Rate Limiting & Abuse Controls
Upstash-backed sliding-window rate limits on auth, billing, and public endpoints. Cloudflare Turnstile on contact and signup.
IP Allowlisting
Owners can restrict dashboard and API access to a specific list of IP ranges from organization security settings.
Email Suppression & Bounce Handling
Hard bounces, complaints, and unsubscribes are honored automatically. Critical transactional mail bypasses suppression.
Data Handling
Where your data lives, who touches it, and how you stay in control.
Data residency
Primary data stored in Neon Postgres (US region by default). DPA available on request for EU customers.
Backups
Continuous point-in-time recovery for the last 7 days via Neon's built-in branching.
Sub-processors
Stripe, Resend, Cloudinary, Sentry, Upstash, and Cloudflare. Full list in our DPA.
Data export & deletion
Account owners can export organization data at any time and request deletion from billing settings.
Report a Vulnerability
We welcome responsible security research. If you discover a vulnerability, please report it through our disclosure program.