PlatformSecurity & Privacy
Security & Privacy
Security features, compliance, and data protection in Workestra.
Security & Privacy
Workestra is built with security and privacy at its core. Learn about our security architecture, compliance certifications, and data protection features.
Security Overview
Workestra implements defense-in-depth security across all layers:
Multi-Tenancy
- Complete data isolation between workspaces
workspace_idenforced on all database queries- No cross-tenant data access possible
Authentication
- Email/password with bcrypt hashing
- OAuth 2.0 for social login
- TOTP-based two-factor authentication
- Backup codes for recovery
Session Management
- JWT tokens with short expiration
- Refresh token rotation
- Brute force protection (6 attempts = 15 min lockout)
- Automatic session timeout
Encryption
| Data | Encryption |
|---|---|
| Data at rest | AES-256 |
| Data in transit | TLS 1.3 |
| API keys | AES-256-GCM |
| Passwords | bcrypt |
| Backup codes | bcrypt |
Row-Level Security (RLS)
Database Policies
125 RLS policies across 32 tables ensure:
- Users only see their workspace data
- Role-based access enforced at database level
- Even admin queries respect policies
Policy Example
-- Users can only see their workspace contacts
CREATE POLICY contact_isolation ON contacts
FOR ALL
USING (workspace_id = current_setting('app.current_workspace')::uuid);Rate Limiting
Four-tier rate limiting on critical routes:
| Tier | Requests/Minute |
|---|---|
| Anonymous | 10 |
| Standard | 100 |
| Professional | 500 |
| Enterprise | 2,000 |
Prevents abuse and ensures platform stability.
GDPR Compliance
Data Rights
Workestra supports GDPR data subject rights:
| Right | Feature |
|---|---|
| Access | Data export tool |
| Rectification | Edit any record |
| Erasure | Data deletion request |
| Portability | Structured export (CSV/JSON) |
| Objection | Opt-out mechanisms |
Data Processing
- Controller: Your organization
- Processor: Workestra Inc.
- DPA: Available for Enterprise customers
- Data Location: EU (Frankfurt) by default
See GDPR Documentation for details.
Audit Logging
Logged Events
9 event types tracked:
| Event | Description |
|---|---|
user.login | Authentication events |
user.logout | Session termination |
user.invited | Team invitations |
user.role_changed | Permission changes |
record.created | Data creation |
record.updated | Data modification |
record.deleted | Data deletion |
settings.changed | Configuration changes |
export.requested | Data exports |
Audit Log Details
Each entry includes:
- Timestamp (UTC)
- Actor (who performed action)
- Action type
- Target resource
- IP address
- User agent
Retention: 2 years
See Audit Log for more.
Compliance Certifications
Current Certifications
| Certification | Status |
|---|---|
| SOC 2 Type II | Certified |
| GDPR | Compliant |
| CCPA | Ready |
Reports Available
- SOC 2 reports (Enterprise customers)
- Penetration test summaries
- Vulnerability assessments
Contact support for compliance documentation.
Security Best Practices
For Users
- Enable 2FA — Strongest security improvement
- Use strong passwords — Unique, complex passwords
- Review sessions — Revoke old/unused sessions
- Be phishing-aware — Verify emails are from Workestra
For Admins
- Principle of least privilege — Minimum necessary access
- Regular access reviews — Quarterly permission audits
- Offboarding — Remove departed users promptly
- Monitor audit logs — Watch for unusual activity
Vulnerability Disclosure
Reporting Security Issues
If you discover a vulnerability:
- Email security@workestra.app
- Include detailed description
- Provide reproduction steps
- Allow 90 days before public disclosure
We respond to all reports within 48 hours.
Bug Bounty
Responsible disclosures may be eligible for rewards.
Infrastructure Security
Hosting
- AWS infrastructure
- ISO 27001 certified data centers
- Geographic redundancy
- DDoS protection
Backup & Recovery
- Daily automated backups
- 30-day retention
- Point-in-time recovery
- Tested restoration procedures
Monitoring
- 24/7 security monitoring
- Automated threat detection
- Incident response procedures
- Security team on-call
Next Steps
- GDPR — Data protection details
- Audit Log — Event tracking
- Settings > Security — Configure 2FA