Security
Single-tenant architecture, AES-256-GCM encryption, ISO 27001 certified Swiss hosting.
Single-tenant architecture, AES-256-GCM encryption, ISO 27001 certified Swiss hosting.
Securing your data is a daily commitment. This page describes the architecture, technical controls and processes we apply to protect the information you entrust to us. For the legal framework and data-subject rights, see our privacy policy and our nLPD page.
Each customer has their own application instance (an isolated Docker container) and their own database. There is no pooling of application data between customers. In practice this means:
Data is encrypted at rest using AES-256-GCM. We use envelope encryption: a separate master key, stored outside the database, encrypts per-customer encryption keys. Data in transit is protected by TLS 1.3 (negotiated by Caddy with Let's Encrypt). Plain HTTP connections are systematically redirected to HTTPS.
We apply a Grandfather-Father-Son strategy across several horizons:
Backups are encrypted end-to-end and stored on infrastructure separate from the primary server. We run a quarterly restore test to validate backup integrity.
All of our infrastructure is hosted at Infomaniak, in Geneva, Switzerland. Infomaniak is certified ISO 27001 (information security), ISO 9001 (quality management) and ISO 14001 (environmental management). Data centres run on 100% renewable hydroelectricity. No customer data is hosted outside Switzerland during normal operations.
Sensitive actions are logged in an immutable audit trail: sign-ins, data exports, deletions, user and role changes, configuration changes. Logs are retained for at least 12 months and can be provided to the customer upon a written, motivated request.
bun audit (Node) and go mod audit (Go) on every build.If you believe you have identified a vulnerability, please write to [email protected]. We commit to acknowledging receipt within 72 business hours and providing a first diagnosis within 10 days. Please do not disclose the vulnerability publicly until we have had an opportunity to remediate.
Our privacy policy and our nLPD compliance page detail the applicable legal framework and the rights you can exercise: Privacy policy, nLPD compliance, Terms of service.