Security Practices
Last updated: April 9, 2026
VeriField Pro LLC takes the security of our Platform and our clients' data seriously. This page describes the security measures, practices, and controls we employ to protect the VeriField Pro MSHA platform and the safety compliance data entrusted to us. Given that our Platform handles safety-critical records that may be subject to MSHA regulatory review, we maintain rigorous security standards.
1. Overview
Our security program is built on the principles of defense in depth, least privilege, and zero trust. We implement multiple layers of security controls to protect against unauthorized access, data breaches, and service disruptions. Our security practices are continuously evaluated and improved to address emerging threats.
2. Encryption
2.1 Data in Transit
- All data transmitted between your device and the Platform is encrypted using TLS 1.3, the latest version of the Transport Layer Security protocol.
- We enforce HTTPS on all connections. HTTP requests are automatically redirected to HTTPS.
- We support only strong cipher suites and disable deprecated protocols (SSLv3, TLS 1.0, TLS 1.1).
- HTTP Strict Transport Security (HSTS) headers are enforced to prevent downgrade attacks.
2.2 Data at Rest
- All stored data, including database records, file uploads, and backups, is encrypted at rest using AES-256 encryption.
- Encryption keys are managed through the cloud provider's key management service with automatic key rotation.
- Database backups are encrypted with separate keys from production data.
3. Authentication and Access Control
- Password Authentication: User accounts are secured with email and password authentication. Passwords are hashed using bcrypt with a high cost factor and are never stored in plain text.
- Multi-Factor Authentication (MFA): MFA is available for all users and required for administrative accounts (SUPER_ADMIN, COMPANY_ADMIN roles). MFA supports time-based one-time passwords (TOTP).
- Session Management: Authentication sessions use secure, HttpOnly, SameSite cookies with automatic expiration. Sessions are invalidated on logout and after a configurable inactivity period.
- Role-Based Access Control (RBAC): The Platform implements granular role-based access control with distinct permission sets for SUPER_ADMIN, COMPANY_ADMIN, SAFETY_MANAGER, SUPERVISOR, and WORKER roles.
- Account Lockout: Accounts are temporarily locked after multiple failed login attempts to prevent brute force attacks.
- Password Policies: We enforce minimum password length and complexity requirements and check against known breached password databases.
4. Data Isolation
TENANT DATA ISOLATION
VeriField Pro implements Row-Level Security (RLS) at the database level. This means that each organization's data is logically isolated so that users from one organization can never access, view, or modify data belonging to another organization, even in the event of an application-level vulnerability.
- RLS policies are enforced at the PostgreSQL database level, below the application layer, providing defense in depth.
- Every database query is automatically scoped to the authenticated user's organization.
- File storage (photos, documents) is organized by tenant with access policies ensuring files are only accessible to authorized users within the same organization.
- RLS policies are reviewed and tested with each database schema change.
5. Infrastructure Security
- Database: Our database is hosted on Supabase, which runs on Amazon Web Services (AWS) infrastructure. The database is deployed in a Virtual Private Cloud (VPC) with no direct public internet access.
- Edge Network: The web application is served via Vercel's global edge network, providing DDoS protection, automated SSL, and geographic distribution for fast load times.
- Data Centers: All data is stored in AWS data centers located within the United States. Our infrastructure providers maintain SOC 2 Type II, ISO 27001, and other certifications.
- Network Security: Firewalls, intrusion detection systems, and network segmentation are employed to protect infrastructure components.
- Serverless Functions: Backend logic runs on serverless infrastructure, eliminating server management risks and providing automatic scaling and isolation.
6. Application Security
- Input Validation: All user inputs are validated and sanitized on both client and server side to prevent injection attacks (SQL injection, XSS, CSRF).
- Content Security Policy: Strict CSP headers are implemented to prevent unauthorized script execution and mitigate XSS risks.
- Dependency Management: Third-party dependencies are regularly audited for known vulnerabilities using automated scanning tools. Critical vulnerabilities are patched within 24 hours of disclosure.
- Audit Logging: All security-relevant events are logged, including authentication attempts, data access, record modifications, and administrative actions. Logs are retained and protected against tampering.
- API Security: API endpoints are authenticated, rate-limited, and input-validated. API keys are scoped to minimum required permissions.
- Secure Development Lifecycle: Security is integrated into our development process through code reviews, automated security scanning, and security-focused testing.
7. Employee Access Controls
- Least Privilege: VeriField Pro employees are granted access to systems and data on a need-to-know basis, with the minimum permissions required for their role.
- Access Reviews: Employee access permissions are reviewed quarterly and adjusted as roles change.
- Production Data Access: Access to production customer data is restricted to authorized personnel and requires documented justification. All production access is logged.
- Offboarding: When an employee departs, all access credentials are revoked immediately.
- Security Training: All employees complete security awareness training upon hire and on an annual basis thereafter.
8. Compliance and Certifications
- SOC 2 Readiness: VeriField Pro is actively pursuing SOC 2 Type II certification and has implemented controls aligned with the Trust Services Criteria (Security, Availability, and Confidentiality).
- Infrastructure Certifications: Our infrastructure providers (AWS, Supabase, Vercel) maintain SOC 2 Type II, ISO 27001, and other industry certifications.
- MSHA Recordkeeping: Our security controls are designed to support clients' MSHA recordkeeping requirements, including the integrity, availability, and retention of safety records.
9. Security Testing
- Automated Scanning: We run automated vulnerability scans against the Platform on a weekly basis using industry standard tools.
- Penetration Testing: We engage qualified third-party security firms to conduct penetration testing at least annually. Critical findings are remediated promptly.
- Code Scanning: Static Application Security Testing (SAST) is integrated into our CI/CD pipeline and runs on every code change.
- Dependency Auditing: Automated tools scan for known vulnerabilities in third-party libraries and frameworks.
10. Incident Response
VeriField Pro maintains a documented security incident response plan that includes:
- Detection: Automated monitoring and alerting systems for anomalous activity.
- Containment: Immediate steps to limit the scope and impact of an incident.
- Investigation: Thorough analysis to determine root cause, scope, and affected data.
- Notification: Affected clients will be notified within 72 hours of confirming a data breach, consistent with applicable law and our Data Processing Agreement.
- Remediation: Implementation of fixes and preventive measures to address the root cause.
- Post-Incident Review: Documentation of lessons learned and improvements to security controls.
11. Vulnerability Disclosure
We appreciate the security research community's efforts to improve the security of our Platform. If you discover a security vulnerability, please report it responsibly:
Report a Security Vulnerability
Email: security@verifieldpro.com
When reporting a vulnerability, please include:
- A description of the vulnerability and its potential impact.
- Detailed steps to reproduce the issue.
- Any proof-of-concept code or screenshots.
We commit to acknowledging receipt of vulnerability reports within 48 hours and providing an initial assessment within 5 business days. We will not pursue legal action against researchers who report vulnerabilities in good faith and in compliance with responsible disclosure principles.
12. Contact Us
For security-related questions or concerns:
VeriField Pro LLC
Security: security@verifieldpro.com
Legal: legal@verifieldpro.com
Website: verifieldpro.com