Security

Security architecture built in from day one.

Data isolation

All records are household-scoped and guarded by authorization policies and tenant-aware query scopes.

Application controls

Session authentication, CSRF protection, rate limiting, and secure password hashing are enabled by default.

Operational controls

Audit logs, secure imports, and cautious export handling protect data integrity and traceability.