Security
Security architecture built in from day one.
Data isolation
All records are household-scoped and guarded by authorization policies and tenant-aware query scopes.
Application controls
Session authentication, CSRF protection, rate limiting, and secure password hashing are enabled by default.
Operational controls
Audit logs, secure imports, and cautious export handling protect data integrity and traceability.