Security

Security is foundational to RKV Consulting. Here's how we protect your data and infrastructure intelligence.

Encryption

All data encrypted in transit (TLS 1.3) and at rest (AES-256). Database connections use SSL. API keys are hashed with SHA-256 before storage.

Infrastructure

Hosted on Vercel (SOC 2 Type II) with Supabase (SOC 2 Type II) for database. Automatic failover, daily backups, and point-in-time recovery.

Access Control

Row-level security policies on all database tables. Role-based access (admin, analyst, viewer). Multi-tenant isolation via organization IDs.

Authentication

Supabase Auth with secure JWT tokens. Password hashing with bcrypt. Support for password reset flows. API keys with configurable scopes and expiration.

Network Security

API rate limiting per key and per plan. Webhook signature verification for Stripe. CORS policies restrict cross-origin access.

Compliance Roadmap

SOC 2 Type II certification planned. GDPR-compliant data handling. Right to erasure supported. Annual security audits on roadmap.

Report a Vulnerability

If you discover a security vulnerability, please report it responsibly to security@rkvconsulting.com

security@rkvconsulting.com