Skip to main content
Security & Compliance

Enterprise-grade protection.

Every credential is encrypted before storage. Every external connection is encrypted in transit. Multi-tenant isolation is enforced at every layer. Security is not an add-on — it is how Korvex is built.

Security postureAll checks passed

Data Encryption

Passed

Fernet encryption for stored credentials, TLS 1.3 for external connections

Authentication

Passed

OAuth 2.0, HttpOnly cookies, zero password storage

Row-Level Security

Passed

Application-level tenant isolation, database RLS on sensitive tables

Access Control

Passed

RBAC with 4 roles, per-client scoping

Credential Storage

Passed

Zero plaintext — Fernet symmetric encryption

API Security

Passed

Per-service rate controls, webhook signature validation

Dependency Scanning

Passed

Trivy scanning in CI, Dependabot for dependency updates

Container Isolation

Passed

28 dedicated service containers

Security posture8/8 checks passed

Your SEO data deserves the same security as your product.

Most SEO tools were not built for enterprise security requirements. Korvex was.

SEO tools handle sensitive data

Your SEO platform has access to Google Search Console, Google Analytics, CMS credentials, and detailed traffic data. If that platform is not built with security-first architecture, your data is one breach away from exposure.

Multi-tenant means shared risk

Most SaaS platforms store all customer data in shared databases. Without row-level security, a single misconfigured query could expose one customer's data to another. That is not a theoretical risk — it has happened to major platforms.

Compliance is table stakes

Enterprise procurement teams require SOC 2, GDPR compliance, and documented security practices before signing contracts. If your SEO vendor cannot provide these, you are adding risk to your supply chain.

Seven layers of protection.

Security is enforced at every layer of the stack, from the database to the API to the browser.

Data encryption

Stored credentials are encrypted with Fernet symmetric encryption. External connections use TLS 1.3 via Cloudflare and nginx. No CMS API key, OAuth token, or integration credential is stored in plaintext.

Authentication

OAuth 2.0 with Google for Search Console and Analytics access. HttpOnly secure cookies prevent XSS token theft. No passwords are stored in our system. Session tokens rotate automatically.

Infrastructure isolation

Each service runs in a dedicated Docker container. Tenant data is isolated at the application layer with per-client scoping. Sensitive tables use PostgreSQL Row-Level Security policies for database-level enforcement.

Access control

Role-based access control with four permission levels: Owner, Admin, Editor, and Viewer. Per-client isolation ensures team members only see the sites they are assigned to. Every action is audit-logged.

API security

Per-service rate controls prevent abuse. Webhook payloads are verified with signature validation. All external endpoints require authentication.

Vulnerability management

Trivy scans container images in CI. Dependabot monitors Python, NPM, and Docker dependencies for known CVEs. Pre-commit hooks enforce secure coding patterns including credential detection.

Credential security

CMS API keys, OAuth tokens, and integration credentials are encrypted with Fernet before storage. Zero plaintext credentials exist anywhere in the system. Encryption keys are rotated on schedule.

Encryption

Three layers of encryption. Zero plaintext.

External connections are encrypted with TLS 1.3. CMS credentials are encrypted with Fernet symmetric encryption. OAuth tokens are stored as encrypted refresh tokens. No credential exists in plaintext anywhere in the system.

CMS API keys for WordPress, Shopify, and Webflow are encrypted before they touch the database. They are decrypted only in memory at the moment of use and are never logged, cached, or exposed through any endpoint.

Encryption layers
TLS 1.3In Transit

All external API calls, webhooks, and client connections are encrypted with TLS 1.3 via Cloudflare and nginx. Internal service mesh communicates over an isolated Docker network.

FernetCredentials

CMS API keys for WordPress, Shopify, and Webflow are encrypted with Fernet symmetric encryption before storage. Decrypted only in memory at moment of use. Never logged or cached.

OAuth 2.0OAuth Tokens

Google API tokens (Search Console, Analytics, Gmail) are stored as encrypted refresh tokens. Access tokens are short-lived and never persisted to disk.

Role-based access control
RoleTeamBillingSettingsDataExport
OwnerFull access
AdminManage team
EditorView team
ViewerView only
Access Control

The right people see the right data.

Role-based access control gives you granular control over who can see what. Four permission levels cover everything from read-only dashboards to full administrative access.

Team members are also scoped to specific client sites. An editor working on one client cannot access data for another, even if both are in the same account. Per-client isolation is enforced at the application layer, with PostgreSQL Row-Level Security policies on sensitive tables as an additional safeguard.

Compliance

Built for enterprise procurement.

Korvex is built with enterprise security requirements in mind. GDPR-aligned data handling with deletion on request and no third-party data sharing. OWASP Top 10 vulnerabilities are mitigated through automated scanning and secure development practices.

We provide security documentation and detailed architecture overviews for procurement and compliance teams. Ask us for anything your team needs to complete their review.

Compliance frameworks

SOC 2 Type II

Planned

Security hardening complete. Formal audit engagement planned for 2026.

GDPR

Aligned

Data export on request. No third-party data sharing for advertising. Data deletion available.

OWASP Top 10

Mitigated

Pre-commit hooks, dependency scanning, and secure coding practices actively mitigate common vulnerabilities.

Platform Monitoring

Active

24/7 automated health checks with Prometheus and Grafana. Graceful degradation architecture.

Roadmap

What we're building next.

Security is never finished. Here's what's on our roadmap.

SOC 2 Type II

Formal audit engagement planned for 2026. Internal security hardening complete.

Database encryption at rest

PostgreSQL Transparent Data Encryption for full disk-level protection.

Formal uptime SLA

99.9% uptime commitment with published incident response procedures.

Data Processing Agreement

Standard DPA for enterprise customers, available on request.

Fernet

credential encryption

TLS 1.3

external encryption

0

plaintext credentials

0

isolated containers

Frequently asked questions.

Security you can verify.

Request our security documentation and architecture overview. We will answer every question your compliance team has.