Security & Compliance
Defense-in-depth controls and governance frameworks to help your team store, sync, and share files with confidence.
Encryption
TLS in transit • Encrypted at rest
Isolation
Per-tenant namespaces & policies
Access Control
RBAC • Keys • Password policies
Observability
Audit logs • Alerts • Webhooks
Defense-in-depth
Layers of protection from identity to storage, with least-privilege controls and full auditability.
- • Transport security: TLS for HTTPS/WebDAV, modern ciphers for SFTP/FTPS
- • Data at rest: encrypted storage and scoped credentials
- • Access policies: roles, IP allow/deny, password & key policies
- • Operational controls: backups, restore testing, change management
Security components
- Protocols
- SFTP, FTPS, HTTPS/WebDAV, APIs
- Key Mgmt
- SSH keys, passwords, rotation policies
- Isolation
- Per-tenant directories & quotas
- Auditing
- Event logs, retention, exports
- Monitoring
- Webhooks & SIEM integrations
- BC/DR
- Automated backups & recovery checks
Data protection
- • TLS for transfers; encrypted storage at rest
- • Versioning & restore options
- • Optional object lock / immutability via backend
Access & identity
- • RBAC: superadmin, tenant admin, user
- • SSH keys & password policies
- • IP allow/deny, session controls
Network & application security
- • Hardened protocol configs (SFTP/FTPS/HTTPS)
- • Rate limits & abuse protections
- • Dependency and patch management processes
Monitoring & incident response
- • Event webhooks to SIEM
- • Alerts for failures & anomalies
- • Runbooks for triage & escalation
