Security

Security

Security is foundational to everything we build. This page describes our comprehensive approach to protecting your identity infrastructure with transparency and accountability.

Effective: January 2025
12 min read

Security Philosophy

Auth Flow exists to secure identity. We operate under the principle that identity infrastructure must be secure by default, transparent in operation, and resilient against evolving threats.

Clear Data Models, Explicit Flows
Unlike black-box solutions, you should understand exactly what happens when a user authenticates, where data flows, and how it's protected.

Architecture Overview

Auth Flow is designed as modular, composable infrastructure:

Stateless API Layer

No single point of failure

Encrypted Data Stores

AES-256 at rest, TLS 1.3 in transit

Tenant Isolation

Complete data separation

Edge Validation

Low-latency global checks

Encryption

In Transit

All connections use TLS 1.3. HTTPS is enforced for all endpoints. HSTS headers prevent downgrade attacks.

At Rest

Data is encrypted using AES-256. Keys are managed via dedicated KMS with automatic rotation.

Credentials

Passwords are hashed with Argon2id and per-user salts. We never store plaintext passwords.

Authentication Security

We support passkeys (WebAuthn/FIDO2), magic links, TOTP, and social login. Rate limiting and progressive delays protect against brute force. Sessions use secure, HTTP-only, SameSite cookies.

Access Control

Fine-grained RBAC with role hierarchies and organization scoping. API keys are capability-scoped and stored as hashes.

Infrastructure Security

SOC 2 Type II certified infrastructure with network segmentation, DDoS protection, geographic redundancy, and automated patching.

Monitoring & Incident Response

24/7 monitoring, comprehensive audit logging, and documented incident response. Breach notification within 72 hours per GDPR.

Compliance

SOC 2 Type II

Annual audits, reports under NDA

GDPR

DPA, SCCs, data export APIs

HIPAA

BAAs for healthcare customers

CCPA/CPRA

California privacy compliance

Your Responsibilities

You are responsible for:

  • Securing your applications and implementing proper session handling
  • Protecting API keys and never committing them to source control
  • Enabling MFA for users when appropriate
  • Monitoring audit logs for suspicious activity
  • Keeping your integration code up to date

Report a Vulnerability

We appreciate responsible disclosure and will acknowledge reports within 24 hours.

Security Team

Security Emailsecurity@auth-flow.com
Bug Bountyauth-flow.com/security/bounty
PGP KeyAvailable on request
Response TimeWithin 24 hours
Security | Auth Flow