Security at Fraud Intercept
We take the security of your data seriously. Here's how we protect the platforms on our network.
Data Protection
AES-256 Encryption at Rest
All data stored on managed AWS infrastructure with AES-256 encryption at rest.
TLS 1.3 in Transit
All data transmitted between your systems and ours is protected with TLS 1.3 encryption.
SHA-256 API Key Hashing
API keys are hashed with SHA-256 before storage. Raw keys are never persisted.
Row Level Security (RLS)
Every database query is scoped to the authenticated platform. Platforms cannot access each other's data.
Infrastructure
Managed PostgreSQL on AWS
All data stored on managed AWS infrastructure with AES-256 encryption at rest.
Global Edge Network
The application is deployed on a global edge network for fast, reliable access worldwide.
TLS 1.3 Everywhere
All connections are encrypted end-to-end with modern TLS 1.3 protocols.
Application Security
JWT Authentication
User authentication is handled with secure JWT tokens and session management.
Rate Limiting
API endpoints are protected with per-key rate limiting using a sliding window algorithm.
Input Validation
All user inputs are validated and sanitized following OWASP best practices to prevent injection attacks.
CSRF Protection
Built-in cross-site request forgery protection on all state-changing operations.
AI Security
Multi-Layer AI Protection
Multiple independent security layers validate and screen all AI interactions, ensuring safe processing of queries and uploaded content.
Abuse Prevention
Built-in safeguards detect and prevent misuse of AI features. Suspicious activity is automatically flagged and reviewed.
Isolated Data Access
The AI assistant operates within strict data boundaries. Each platform's data is completely isolated, ensuring the assistant only works with your information.
Full Audit Trail
Every AI interaction is recorded for accountability and compliance, giving you complete visibility into how the assistant is being used.
Platform Approval & Access Control
Vetted Platform Access
Every platform undergoes a manual approval process before gaining access to the network.
Strict Data Isolation
Row Level Security ensures each platform can only query, modify, and export their own data.
Role-Based Access
Middleware-enforced role separation between platform administrators and system operators.
API Key Management
SHA-256 Hashing
Keys are hashed before storage. We never store or log raw API keys.
Per-Key Rate Limiting
Each API key has independent rate limits enforced via a sliding 1-minute window.
Permission Scoping
API keys are scoped to their platform's data. Cross-platform access is not possible.
Instant Revocation
API keys can be revoked immediately from the dashboard, taking effect on the next request.
Report a Vulnerability
If you discover a security vulnerability, please report it responsibly to:
fraud.intercept@outlook.comWe commit to acknowledging reports within 24 hours and providing updates on remediation progress.