Security Documentation
Effective: February 7, 2026 | Last updated: 2/20/2026
Table of Contents
1. Data Encryption
- TLS 1.3 for all data in transit.
- AES-256 for data at rest.
- End-to-end protection for uploaded photos across the processing flow.
2. Authentication & Access Control
- Clerk-based authentication for secure sign-in and session handling.
- Role-based access control for scoped user permissions.
- Session management with expiration controls and session abuse protections.
- Optional multi-factor authentication (MFA) for stronger account security.
3. Infrastructure Security
- Hosted on Vercel (SOC 2) for hardened and scalable delivery.
- File storage on Cloudflare R2.
- Database and backend operations on Convex.
- DDoS protection and edge security controls via Cloudflare.
4. Evidence Integrity
- SHA-256 hashing for evidence integrity verification.
- Extraction of relevant EXIF metadata (where available) for traceability.
- Audit and integrity metadata for data origin and handling steps (e.g., upload and processing timestamps).
- Tamper-evident integrity controls (e.g., hash verification) to identify post-capture modifications.
For full technical and process prerequisites, see our Evidence Requirements.
5. Application Security
- Rate limiting to mitigate abusive traffic patterns.
- Input validation to reduce unsafe data handling.
- CSRF protections for state-changing operations.
- Content Security Policy (CSP) headers to reduce injection risk.
- Regular dependency scanning for known vulnerabilities.
6. Incident Response
- Continuous monitoring with operational alert procedures.
- Defined escalation and response workflows for security incidents.
- Notification of affected parties and authorities within 72 hours under GDPR where required.
- Security incidents can be reported to security@faultrix.com.
7. Compliance
- Data protection alignment with GDPR (EU) and DSG (Austria).
- Report and process alignment with relevant OeNORM standards.
- Security and privacy controls are reviewed and updated regularly.
8. Vulnerability Disclosure
- Faultrix follows a responsible disclosure policy for reported vulnerabilities.
- Security researchers are asked to provide reproducible details and report responsibly.
- Contact for vulnerability reports: security@faultrix.com