Data Security Overview
Encryption, access controls, and infrastructure security.
Encryption
- In Transit — all connections use TLS 1.2/1.3 (HTTPS enforced via HSTS)
- At Rest — database storage uses AES-256 encryption (LUKS2)
- API Keys — stored as bcrypt hashes, never in plaintext
- Passwords — bcrypt-hashed with per-user salt
Access Controls
- Two-Factor Authentication — TOTP-based 2FA available for all accounts
- Tenant Isolation — each customer's data is strictly separated at the database level
- API Rate Limiting — Redis-backed sliding window prevents abuse
Infrastructure
- Hosted on AWS with firewall-restricted access
- Only HTTPS (ports 80/443) exposed to the internet
- All internal services communicate over private Docker networks
- Regular security audits and penetration testing
Ready to Find Your Revenue Leaks?
LeakShield AI uses autonomous agents to monitor your revenue streams 24/7 — detecting leaks, prioritizing by impact, and showing you exactly how to fix them.
Get Started