Security at ClientFlow

Built with security in mind

ClientFlow is engineered with strict tenant isolation, audited access controls, and modern transport security. Below is the honest list of what ships today.

Security Practices

How we keep your data safe every day.

Encryption at Rest & In Transit

Data encrypted at rest via Neon Postgres (AES-256). All traffic served over TLS 1.3.

Role-Based Access Control

Granular permissions across Owner, Admin, Manager, Member, and Client roles, enforced at every server boundary.

Tenant Isolation

Every query is scoped by organization ID at the data-access layer. Cross-tenant reads are blocked by construction.

Audit Logging

Every privileged action writes to an immutable audit log with actor, IP, user-agent, and before/after snapshots.

Multi-Factor Authentication

TOTP-based two-factor authentication available to every user. Google OAuth sign-in supported.

Rate Limiting & Abuse Controls

Upstash-backed sliding-window rate limits on auth, billing, and public endpoints. Cloudflare Turnstile on contact and signup.

IP Allowlisting

Owners can restrict dashboard and API access to a specific list of IP ranges from organization security settings.

Email Suppression & Bounce Handling

Hard bounces, complaints, and unsubscribes are honored automatically. Critical transactional mail bypasses suppression.

Data Handling

Where your data lives, who touches it, and how you stay in control.

Data residency

Primary data stored in Neon Postgres (US region by default). DPA available on request for EU customers.

Backups

Continuous point-in-time recovery for the last 7 days via Neon's built-in branching.

Sub-processors

Stripe, Resend, Cloudinary, Sentry, Upstash, and Cloudflare. Full list in our DPA.

Data export & deletion

Account owners can export organization data at any time and request deletion from billing settings.

Report a Vulnerability

We welcome responsible security research. If you discover a vulnerability, please report it through our disclosure program.