Security & Trust Center

Your sensitive IT data deserves enterprise-grade protection. We've built security into every layer of IT Folder, exceeding banking-industry standards.

Security Posture: Grade A Production Ready

Enterprise-Grade Security

Multi-layered security architecture designed to protect your most sensitive IT data.

Bank-Grade Encryption

Military-grade AES-256 encryption for all data at rest. Each sensitive field gets its own dedicated encryption key, automatically managed and rotated.

Multi-Factor Authentication

Multiple options including authenticator apps, passkeys, email codes, and recovery codes. Passkeys provide phishing-resistant authentication.

Single Sign-On

Enterprise SSO support plus login with Google, Microsoft, and GitHub. Centralize access control with your existing identity system.

Secure Session Management

Server-side sessions with automatic expiry. Short-lived access tokens and automatic logout. Maximum 5 concurrent sessions per user.

Password Security

Industry-standard password hashing with multiple layers of protection. Account lockout after 5 failed attempts prevents brute force attacks.

Rate Limiting

Intelligent rate limiting on all operations. Custom limits on sensitive actions like login and password reset to prevent abuse.

Authentication & Access Control

Multiple layers of authentication to ensure only authorized users access your data.

Authenticator Apps

Google Authenticator, Authy, and other authenticator apps

Passkeys

Passwordless authentication with biometrics or security keys

Email Codes

One-time codes sent to verified email addresses

Recovery Codes

Backup codes for account recovery

Enterprise SSO

Single sign-on with your identity provider

Account Lockout

5 failed attempts triggers 30-minute lockout

Security Headers

Industry-standard HTTP security headers protect against common web vulnerabilities.

Content-Security-Policy

Nonce-based CSP (no unsafe-inline)

Active
Strict-Transport-Security

HSTS with preload

Active
X-Frame-Options

DENY - prevents clickjacking

Active
X-Content-Type-Options

nosniff - prevents MIME sniffing

Active
Referrer-Policy

strict-origin-when-cross-origin

Active
X-XSS-Protection

Browser XSS filter enabled

Active

OWASP Top 10 Compliance

IT Folder is fully compliant with the OWASP Top 10:2025 security risks.

Category Risk Status Implementation
A01 Broken Access Control Pass RBAC, tenant isolation, BOLA/IDOR tests, SSRF protection
A02 Security Misconfiguration Pass CORS validated, security headers enforced, CSP with nonces
A03 Supply Chain Failures Pass pip-audit, Grype/Syft SBOM, pinned dependencies
A04 Cryptographic Failures Pass PBKDF2 100K rounds, PyJWT, AWS KMS, TLS 1.3
A05 Injection Pass Semgrep + Bandit scans, parameterized queries, SQLAlchemy ORM
A06 Insecure Design Pass Current password required for changes, admin reset with session revocation
A07 Authentication Failures Pass MFA (TOTP/Passkey/Email), account lockout, rate limiting
A08 Data Integrity Failures Pass No pickle/eval usage, safe YAML loading, signed cookies
A09 Security Logging Failures Pass AuthLogger with security events, PII redaction
A10 Improper Error Handling Pass Sanitized error responses, no stack traces exposed

Exceeds Banking Standards

IT Folder meets or exceeds security controls required by financial institutions.

Security Control Status
Session Management

Redis-backed, server-side validation

Exceeds
CSRF Protection

Double Submit + Redis hash + Origin validation

Exceeds
Token Rotation

Automatic rotation with 60s grace period

Exceeds
Multi-Factor Auth

TOTP, Passkey, Email OTP, Recovery codes

Exceeds
Security Control Status
Cookie Security

HMAC-SHA256 signed, HttpOnly, Secure

Meets
Session Fixation

New session ID on MFA promotion

Meets
Audit Logging

All auth events with PII redaction

Meets

Areas Exceeding Banking Standards

  • Triple-layer CSRF protection — Most banks use single-layer
  • Opaque token pattern — JWTs never exposed to client
  • Signed cookies with HMAC — Most banks don't sign cookies
  • Grace period for token rotation — Prevents race conditions

Privacy by Design

GDPR-compliant data handling with privacy-first architecture.

Data Minimization

No fingerprinting, masked IPs. We collect only what's necessary for the service.

US-Based Data Centers

All data stored in secure US West Coast data centers with Amazon Aurora replication.

Audit Logging

Comprehensive security event logging with automatic PII redaction.

Your Data, Protected

Every tenant gets isolated, encrypted storage with enterprise-grade backup and recovery.

Dedicated S3 Buckets

Each tenant has their own encrypted S3 bucket for documents and files.

Amazon Aurora Database

Continuous replication across multiple Availability Zones.

Daily Encrypted Backups

Automated daily snapshots with point-in-time recovery.

TLS 1.3 Encryption

All data encrypted in transit with the latest TLS standard.

Security Scanning & Testing

We continuously test our security with industry-standard tools:

Semgrep

Static analysis with 13 custom rules

Bandit

Python security linter

pip-audit

Dependency vulnerability scanning

Trivy

Container security scanning

Ready to Secure Your IT Data?

Start your 14-day free trial and experience enterprise-grade security.