Skip to content
SECURITY

Your data is our highest priority

Enterprise-grade security built for businesses that handle real gold, real money, and real trust.

AES-256 EncryptionData encrypted at rest and in transit
SOC 2 AlignedSecurity controls audited
Complete Audit TrailWho, what, when, before/after
Data Residency: EgyptYour data stays in Egypt
Role-Based AccessGranular permission control
Two-Factor AuthPIN + session verification
API SecurityScoped keys with rate limiting
Backup & DRPoint-in-time recovery
Tenant IsolationRLS data separation
Penetration TestedRegular security assessments

Tenant Isolation

Every business operates in complete isolation. Row-Level Security ensures no cross-tenant data access — ever.

  • RLS policies on every database table
  • Tenant context validated on every API request
  • No cross-business visibility paths
  • Automated isolation testing on every release

Role-Based Access Control

Granular permissions enforced on the backend. The UI reflects permissions but never determines them.

  • Predefined roles: Admin, Manager, Cashier, Viewer
  • Custom permission sets per role
  • Server-side enforcement on every mutation
  • Activity logging for every permission change

Encryption at Rest & Transit

All data encrypted with AES-256 at rest and TLS 1.3 in transit. Webhook payloads signed with HMAC.

  • AES-256 database encryption
  • TLS 1.3 for all API communication
  • HMAC-signed webhook deliveries
  • Automatic key rotation support

Complete Audit Trail

Every mutation logged with who, what, when, and the complete before/after state. Tamper-evident and queryable.

  • Before/after state on every change
  • Immutable audit log
  • Filterable by user, action, entity
  • Exportable reports for compliance reviews

Automated Backups

Continuous backups with point-in-time recovery. Your data is always recoverable, even after accidental deletion.

  • Point-in-time recovery (PITR)
  • Daily automated backup verification
  • Encrypted backup storage
  • Cross-region disaster recovery ready

Agent Security

The store agent communicates over encrypted channels with PIN authentication and scoped access.

  • Encrypted agent-to-cloud channel
  • PIN-based operator authentication
  • Scoped to receipt printing and sync only
  • Automatic session timeout and lockout

Your data stays in Egypt

All production data is hosted in Egyptian data centers. No data leaves the region without explicit consent.

Questions about our security practices?

Our team can walk you through our security architecture, compliance posture, and data protection measures.