Security & compliance

Security and compliance are built into the platform—not bolted on.

Built for the day your auditor or investor asks for a single source of truth.

Data isolation

Multi-tenant architecture

Tenant data is logically isolated. No cross-tenant access at the API or data layer. Access is enforced at the API and database layer by tenant identity.

Encryption

Encryption at rest and in transit (TLS). Sensitive data protected using industry-standard practices.

Access scoping

Access scoped by role and organization. Your data is isolated by design. No use of your data for training or cross-tenant analytics without explicit consent.

Identity & access

Proprietary identity layer

Centralized authentication, SSO-ready, role-based access control (RBAC), and multi-factor authentication (MFA). Session management and device control. No dependency on third-party identity for core security.

Role-based access control

Owner, manager, staff, and viewer permissions enforced at the application and API layer.

Compliance readiness

Audit trails for financial and operational actions. Designed for GST and audit requirements. Path to SOC 2 and institutional requirements stated clearly; we document our posture and improve over time.

Indian context: GST-ready reports, e-sign readiness, agreement and notice tracking. From single-owner to institutional: same platform, same audit trail.

Uptime & reliability

Target uptime

Uptime target designed for operational continuity. Blue-green deployments; no planned downtime for releases. Automated health checks and incident response readiness.

Backup & recovery

Backup and recovery procedures designed for operational continuity. We document our posture and improve over time; no exaggerated claims.

Auditability

Event-emitting design: every payment, move-in, meter reading, and key config change is an event. Logs and trails available for operators and for institutional due diligence. Enables dispute resolution, compliance, and investor due diligence from one audit trail.