Flowframe Logo

Security at Flowframe

Effective Date: January 10, 2026

Last Updated: January 10, 2026

Version: 1.0


OVERVIEW

Flowframe implements enterprise-grade security measures to protect your data. This page details our comprehensive security architecture, compliance certifications, and best practices.

Key Security Highlights:

  • šŸ”’ Dual Architecture: Secure server-based DB queries + client-side file processing
  • šŸ” End-to-End Encryption: TLS 1.3 in transit, AES-256 at rest
  • šŸ‡ŖšŸ‡ŗ EU Data Residency: Hosted in London, UK (GDPR-compliant)
  • āœ… Zero Trust Architecture: Principle of least privilege enforced
  • šŸ“‹ Compliance: GDPR-compliant
  • šŸ—‘ļø Immediate Deletion: Uploaded files deleted instantly on request (no backups)

TABLE OF CONTENTS

  1. Architecture Security
  2. Encryption
  3. Infrastructure and Hosting
  4. Access Controls
  5. Application Security
  6. Network Security
  7. Personnel Security
  8. Data Backup and Recovery
  9. Incident Response
  10. Compliance and Certifications
  11. Third-Party Security
  12. Security Monitoring
  13. Vulnerability Management
  14. Security Best Practices for Customers
  15. Security Roadmap
  16. Reporting Security Issues

1. ARCHITECTURE SECURITY

1.1 Dual Processing Architecture

Flowframe uses two distinct architectures for maximum security and flexibility:

Architecture 1: Cloud Database Connections

For cloud databases (PostgreSQL, MySQL, SQL Server, etc.):

Your Database → Flowframe Servers → Secure Connection → Query Execution → Results to Browser
                āœ… Encrypted transit (TLS 1.3)
                āœ… Results transient (not stored)
                āš ļø Results pass through our servers
                āœ… Enhanced security & firewall compatibility

Security Measures:

  • Database credentials encrypted end-to-end
  • Queries executed through secure proxy servers
  • Results transmitted but NOT stored (transient only)
  • Connection pooling with strict isolation
  • IP whitelisting support for customer firewalls

Why Through Servers:

  • āœ… Secure tunneling and connection management
  • āœ… Firewall compatibility (easier to whitelist Flowframe IPs)
  • āœ… Connection pooling for team collaboration
  • āœ… Credential rotation and management

Architecture 2: File Uploads

For uploaded files (CSV, Parquet, JSON):

Your File → Client-Side Processing (DuckDB WASM) → Encrypted Storage (DigitalOcean Spaces)
           āœ… Processed in browser first
           āœ… AES-256 encryption at rest
           āš ļø Flowframe has access (Data Processor)
           āœ… Immediate deletion on request

Security Measures:

  • Files processed client-side with DuckDB WASM before upload
  • Encrypted with AES-256 server-side encryption in DigitalOcean Spaces
  • Stored in London, UK datacenter (GDPR-compliant)
  • No backups created (primary storage only)
  • Immediate deletion when user requests removal
  • Access strictly limited to authorized personnel

1.2 What We Store vs. What Stays Local

Data TypeStorage LocationEncryptionCan Flowframe Access?Duration
Query results (cloud DB)Browser cache onlyN/A (transient on servers)āš ļø Transient access during transmissionNot stored
Query results (file uploads)Browser cache onlyN/AāŒ NO - client-side onlySession only
Uploaded file contentsDigitalOcean SpacesAES-256 at restāš ļø YES - we are Data ProcessorUntil deletion
Database credentialsBrowser + ServersAES-256 + TLS 1.3āš ļø YES - encrypted at restUntil you remove connection
SQL query textOur serversAES-256 at restāœ… YES - for version historyUntil project deletion
Metadata descriptionsOur serversAES-256 at restāœ… YES - for AI and collaborationUntil project deletion
Account credentialsOur serversBcrypt hashedāœ… YES - but password hashed (we can't see plaintext)Until account deletion
Collaboration stateOur serversAES-256 at restāœ… YES - for real-time editingUntil project deletion

Key Security Principles:

  • Query Results: Not stored on servers (cloud DB queries pass through transiently)
  • File Uploads: Encrypted at rest, access controlled and logged
  • Database Credentials: Encrypted end-to-end, never logged
  • Zero Backups: Uploaded files have no backup copies (immediate deletion)

1.3 DuckDB WASM Security (File Processing)

DuckDB WebAssembly (WASM) executes file queries in your browser:

  • āœ… Sandboxed environment (browser security sandbox)
  • āœ… No network access for query execution
  • āœ… Cannot access your filesystem (except browser local storage)
  • āœ… Memory isolation from other browser tabs
  • āœ… Open-source (MIT License) - auditable by security researchers
  • āœ… Processing happens before files are encrypted and uploaded

1.4 Benefits of Our Architecture

Security Benefits:

  • šŸ”’ Defense in Depth: Multiple layers of encryption and access control
  • šŸ›”ļø Minimal Data Retention: Query results not stored, files deleted immediately on request
  • 🚫 Breach Mitigation: Query results transient (not affected by server breach)
  • šŸ” Encryption Everywhere: TLS 1.3 in transit, AES-256 at rest
  • šŸ“ Access Logging: All access to uploaded files logged and monitored
  • šŸ—‘ļø Right to Erasure: Immediate deletion (no backup recovery period)

Performance Benefits:

  • ⚔ Faster File Analysis: Client-side DuckDB WASM for file queries
  • 🌐 Persistent Storage: Files available across sessions (unlike pure client-side)
  • šŸ’° Cost-Effective: Secure cloud storage with no backup overhead

Compliance Benefits:

  • āœ… GDPR-Ready: Data Processing Agreement available, EU storage location
  • āœ… Right to Deletion: Immediate file deletion (no recovery period)
  • āœ… Data Portability: Export your files anytime
  • āœ… Transparency: Clear documentation of what we store and access

2. ENCRYPTION

2.1 Data in Transit

All data transmitted between your browser and Flowframe servers is encrypted:

ProtocolVersionCipher SuitesCertificate
TLS1.3 (latest)AES-256-GCM, ChaCha20-Poly1305SHA-256 signed from trusted CA
HTTPSForced (HSTS enabled)Perfect Forward Secrecy2048-bit RSA / ECC
WebSocketSecure (WSS)TLS 1.3Same as HTTPS

Features:

  • āœ… Perfect Forward Secrecy: Past sessions protected even if keys compromised
  • āœ… HSTS (HTTP Strict Transport Security): Prevents downgrade attacks
  • āœ… Certificate Pinning: Mobile apps (planned) pin certificates for extra security
  • āœ… No Downgrade: TLS 1.0, 1.1, 1.2 disabled (only TLS 1.3 allowed)

Testing: Qualys SSL Labs Grade: A+ (target)

2.2 Data at Rest

All data stored on our servers is encrypted:

Data TypeEncryption AlgorithmKey ManagementKey Rotation
Database (PostgreSQL)AES-256-CBCPostgreSQL pgcryptoAnnually
BackupsAES-256-GCMSeparate encryption keysAnnually
File StorageAES-256DigitalOcean Block Storage EncryptionManaged by DO
LogsAES-256Application-level encryptionQuarterly

Key Management:

  • šŸ”‘ Encryption keys stored separately from encrypted data
  • šŸ”‘ Key rotation: Annual rotation for database encryption keys
  • šŸ”‘ Access controls: Only authorized personnel can access keys
  • šŸ”‘ Audit logging: All key access logged

2.3 Password Security

Your password is NEVER stored in plaintext:

StepMethodSecurity Level
Hashing AlgorithmBcryptIndustry standard
SaltRandomly generated per passwordUnique per user
Rounds12 (cost factor)~300ms to hash (slows brute force)
StorageHashed password onlyWe cannot see your plaintext password

What this means:

  • āœ… If our database is compromised, attackers get hashed passwords only
  • āœ… Bcrypt is designed to be slow - makes brute force attacks impractical
  • āœ… Salt prevents rainbow table attacks - each password hashed differently
  • āœ… We cannot recover your password - only reset it

Password Requirements:

  • Minimum 8 characters (12+ strongly recommended)
  • Complexity: Mix of uppercase, lowercase, numbers recommended
  • No maximum length (up to 72 characters due to bcrypt limit)
  • No password expiration (industry best practice - forced rotation leads to weaker passwords)

2.4 Database Credential Encryption

Database credentials are encrypted end-to-end:

Storage LocationEncryption MethodProtectionAccessibility
In Transit (Browser to Servers)TLS 1.3 (AES-256-GCM)Perfect Forward SecrecyEncrypted during transmission
At Rest (Flowframe Servers)AES-256Encrypted in databaseFlowframe (encrypted, access logged)

Protection:

  • šŸ” End-to-End Encryption - encrypted in transit via TLS 1.3
  • šŸ” Encrypted at Rest - stored encrypted on Flowframe servers with AES-256
  • šŸ” Access Logged - all credential access monitored and logged
  • šŸ” Secure Transmission - never sent unencrypted

Recommendations:

  • āœ… Use read-only database credentials when possible
  • āœ… Enable database firewall / IP whitelisting
  • āœ… Rotate credentials every 90 days
  • āœ… Don't reuse database passwords

3. INFRASTRUCTURE AND HOSTING

3.1 Hosting Provider

Primary Host: DigitalOcean Data Center: LON1 (London, United Kingdom) Reason: EU data residency for GDPR compliance, low latency for European customers

ResourceConfigurationSecurity Features
ComputeManaged Kubernetes (DOKS)Auto-patching, isolated nodes
DatabaseManaged PostgreSQLAutomated backups, encryption, VPC isolation
StorageBlock Storage VolumesAES-256 encryption, redundancy
NetworkingVirtual Private Cloud (VPC)Isolated network, firewall rules

3.2 Infrastructure Security

Network Isolation:

  • āœ… VPC (Virtual Private Cloud): Database servers in private network with NO public internet access
  • āœ… Jump hosts required for admin access (not direct SSH to production)
  • āœ… Bastion host with MFA for privileged access
  • āœ… Private DNS for internal service discovery

Compute Security:

  • āœ… Container security: Docker images scanned for vulnerabilities
  • āœ… Minimal base images: Alpine Linux (smaller attack surface)
  • āœ… Immutable infrastructure: Containers replaced, not patched (prevents configuration drift)
  • āœ… Resource limits: CPU/memory limits prevent resource exhaustion attacks

Database Security:

  • āœ… No public IP: Database accessible only from app servers in VPC
  • āœ… Firewall rules: Only specific ports open
  • āœ… SSL/TLS required: Client connections must use TLS

3.3 Physical Security (Data Center)

DigitalOcean LON1 Data Center features:

  • šŸ¢ 24/7 Security Guards: On-site personnel
  • šŸ“· Surveillance Cameras: CCTV monitoring all access points
  • šŸ”‘ Biometric Access Control: Fingerprint/retina scanners
  • 🚪 Mantrap Entrances: Dual-door access (one door must close before other opens)
  • šŸ”„ Fire Suppression: Advanced fire detection and suppression systems
  • ⚔ Uninterruptible Power Supply (UPS): Backup generators for power outages
  • ā„ļø Climate Control: HVAC systems maintain optimal temperature

Compliance: DigitalOcean data centers are ISO 27001, SOC 2 Type II certified.

3.4 Geographic Redundancy (Planned)

Current (Beta):

  • Single region: London, UK (LON1)

Planned (Post-GA):

  • Secondary region: New York (NYC3)
  • Cross-region replication: Real-time database replication
  • Automatic failover: If primary region fails, automatic switch to secondary
  • Enterprise customers: Choose primary region (US, EU, APAC)

4. ACCESS CONTROLS

4.1 User Authentication

Login Security:

  • āœ… Email + Password: Industry-standard authentication
  • āœ… Account Lockout: After 5 failed login attempts (30-minute lockout)
  • āœ… Session Timeout: Automatic logout after 24 hours of inactivity
  • āœ… Secure Session Cookies: HTTP-only, SameSite=Lax, Secure flag
  • āœ… Two-Factor Authentication (2FA): TOTP-based MFA (planned Q2 2026)

Planned Enhancements (Q2 2026+):

  • 🚧 SSO / SAML: Single Sign-On for Enterprise customers
  • 🚧 OAuth 2.0: Social login (Google, Microsoft)
  • 🚧 Passkeys / WebAuthn: Passwordless authentication
  • 🚧 Hardware Security Keys: FIDO2 / YubiKey support

4.2 Role-Based Access Control (RBAC)

Workspace Roles:

RolePermissionsUse Case
OwnerFull control (manage billing, delete workspace, all admin functions)Workspace creator, billing admin
AdminManage users, projects, settings (cannot delete workspace or change billing)Team manager
DeveloperCreate/edit projects, run queries, collaborateData analysts, engineers
ExplorerView projects, run read-only queries, cannot editStakeholders, product managers
ViewerView projects only, cannot run queries or editExecutives, external stakeholders

Permission Matrix:

ActionOwnerAdminDeveloperExplorerViewer
Create projectsāœ…āœ…āœ…āŒāŒ
Edit projectsāœ…āœ…āœ…āŒāŒ
Delete projectsāœ…āœ…āœ…āŒāŒ
Run queriesāœ…āœ…āœ…āœ… (read-only)āŒ
View projectsāœ…āœ…āœ…āœ…āœ…
Add team membersāœ…āœ…āŒāŒāŒ
Manage billingāœ…āŒāŒāŒāŒ
Delete workspaceāœ…āŒāŒāŒāŒ

4.3 Administrative Access (Flowframe Personnel)

Principle of Least Privilege:

  • šŸ”’ Only 2 senior engineers have production access
  • šŸ”’ No customer support access to production systems
  • šŸ”’ Temporary elevated access for debugging (time-limited, logged)
  • šŸ”’ MFA required for all access
  • šŸ”’ Audit logging of all admin actions

Access Tiers:

TierAccess LevelWhoMFA RequiredAudit Logging
Level 1 - SupportRead-only account info (email, name, billing status)Customer supportāœ… Yesāœ… Yes
Level 2 - EngineeringAnonymized logs, debugging data (no PII)Engineersāœ… Yesāœ… Yes
Level 3 - AdminFull production access (emergency only)CTO, Lead Engineerāœ… Yesāœ… Yes

Limited Access to Your Data:

  • āŒ Flowframe personnel cannot access your business data (query results are transient, not stored)
  • āŒ Even with admin access, we only see SQL query text, not query results
  • āš ļø Database credentials are encrypted at rest - access restricted to authorized personnel only and fully logged

4.4 API Security

API Authentication:

  • šŸ”‘ API Keys: Long, randomly generated keys (256-bit entropy)
  • šŸ”‘ Key Rotation: Customers can rotate keys anytime
  • šŸ”‘ Scoped Permissions: Keys can be scoped to specific workspaces/projects
  • šŸ”‘ Rate Limiting: 100 req/min (Free), 1,000 req/min (Pro), custom (Enterprise)

API Security Features:

  • āœ… HTTPS Only: All API requests require TLS
  • āœ… CORS Policies: Strict Cross-Origin Resource Sharing rules
  • āœ… Request Signing: HMAC request signatures (Enterprise API)
  • āœ… IP Whitelisting: Enterprise customers can whitelist IPs
  • āœ… OAuth 2.0: Planned for third-party integrations (Q2 2026)

5. APPLICATION SECURITY

5.1 Secure Development Lifecycle

Development Practices:

  • āœ… Code Reviews: All code reviewed before merging (2-person approval)
  • āœ… Security Training: Annual secure coding training for all engineers
  • āœ… Dependency Scanning: Automated scanning for vulnerable dependencies (GitHub Dependabot)
  • āœ… Static Analysis: Automated code security scanning (ESLint security rules, Semgrep)
  • āœ… Secret Scanning: Pre-commit hooks prevent accidental commit of secrets
  • āœ… CI/CD Security: Secure build pipelines with signed artifacts

Deployment:

  • āœ… Staging Environment: All changes tested in staging before production
  • āœ… Blue-Green Deployment: Zero-downtime deployments
  • āœ… Rollback Capability: Can revert to previous version within minutes
  • āœ… Canary Deployments: Gradual rollout to subset of users first

5.2 OWASP Top 10 Protection

Flowframe implements protections against OWASP Top 10 vulnerabilities:

VulnerabilityProtection
1. Broken Access ControlRBAC, server-side permission checks, deny-by-default
2. Cryptographic FailuresTLS 1.3, AES-256, bcrypt, no sensitive data in logs
3. InjectionParameterized queries, input validation, prepared statements
4. Insecure DesignThreat modeling, security architecture reviews
5. Security MisconfigurationInfrastructure-as-code, automated security configs
6. Vulnerable ComponentsDependency scanning, automated updates, SCA tools
7. Authentication FailuresBcrypt, MFA (planned), session management, account lockout
8. Software/Data IntegrityCode signing, SRI for CDN assets, immutable infrastructure
9. Logging/Monitoring FailuresCentralized logging, real-time alerts, SIEM (planned)
10. SSRFWhitelist allowed domains, network isolation, input validation

5.3 Input Validation and Sanitization

All user input is validated:

  • āœ… Server-Side Validation: Never trust client-side validation alone
  • āœ… Whitelist Approach: Allow known-good input, reject everything else
  • āœ… Length Limits: All text fields have maximum lengths
  • āœ… Type Checking: Strict type validation (TypeScript on frontend, backend)
  • āœ… SQL Injection Prevention: Parameterized queries, prepared statements
  • āœ… XSS Prevention: Output encoding, Content Security Policy (CSP)
  • āœ… CSRF Protection: Anti-CSRF tokens on all state-changing requests

Content Security Policy (CSP):

Content-Security-Policy:
  default-src 'self';
  script-src 'self' 'wasm-unsafe-eval';
  style-src 'self' 'unsafe-inline';
  img-src 'self' data: https:;
  connect-src 'self' https://api.flowframe.io;
  frame-ancestors 'none';
  base-uri 'self';
  form-action 'self';

XSS Protection:

  • āœ… React Auto-Escaping: React escapes output by default
  • āœ… DOMPurify: Sanitize HTML before rendering (if rendering user HTML)
  • āœ… CSP: Blocks inline scripts, restricts script sources

6. NETWORK SECURITY

6.1 Firewalls

Cloud Firewall (DigitalOcean):

  • āœ… Inbound Rules: Only required ports are open
  • āœ… Outbound Rules: Allow only necessary outbound connections
  • āœ… Default Deny: All traffic denied by default, explicitly allow only necessary
  • āœ… Geo-Blocking: Block traffic from high-risk countries (optional for Enterprise)

Web Application Firewall (WAF):

  • āœ… OWASP ModSecurity Rules: Core rule set for common attacks
  • āœ… Rate Limiting: Limit requests per IP (prevents brute force, DDoS)
  • āœ… IP Reputation: Block known malicious IPs
  • āœ… Bot Detection: Identify and block malicious bots

6.2 DDoS Protection

Protection Layers:

  • šŸ›”ļø Layer 3/4 DDoS: DigitalOcean Cloud Firewall (automatic mitigation)
  • šŸ›”ļø Layer 7 DDoS: Application-level rate limiting, CAPTCHA challenges
  • šŸ›”ļø CDN: Cloudflare (planned) for edge caching and DDoS mitigation

Mitigation Strategies:

  • āœ… Rate Limiting: Per-IP, per-user, per-API key
  • āœ… Auto-Scaling: Kubernetes auto-scaling for traffic spikes
  • āœ… Traffic Analysis: Real-time monitoring for anomalous traffic patterns

6.3 Network Segmentation

VPC Segmentation:

ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”
│ Internet                                                 │
ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¬ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜
                 │
         ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā–¼ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”
         │ Load Balancer │ (Public IP)
         ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¬ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜
                 │
    ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā–¼ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”
    │ Application Tier (VPC)  │ (Private IPs)
    │ - Web Servers           │
    │ - API Servers           │
    ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”¬ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜
                 │
      ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā–¼ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”
      │ Database Tier (VPC) │ (Private IPs, No Internet)
      │ - PostgreSQL        │
      │ - Redis Cache       │
      ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜

Benefits:

  • šŸ”’ Database Isolation: No public internet access to database
  • šŸ”’ Lateral Movement Prevention: If app server compromised, limited access to database
  • šŸ”’ Blast Radius Reduction: Compromise contained to one tier

7. PERSONNEL SECURITY

7.1 Background Checks

For all employees with access to production systems or customer data:

  • āœ… Employment Verification: Confirm previous employment
  • āœ… Criminal Background Check: Check for criminal history
  • āœ… Reference Checks: Contact provided references

Timing: Before granting production access

7.2 Confidentiality Agreements

All personnel sign:

  • āœ… Employment Agreements: Include data protection and confidentiality clauses
  • āœ… Non-Disclosure Agreements (NDAs): For contractors and vendors
  • āœ… GDPR Confidentiality Commitments: Specific GDPR obligations

Obligations Survive: Confidentiality obligations continue after employment ends

7.3 Security Training

Mandatory Training:

  • šŸ“š Onboarding Security Training: All new employees (within first week)
  • šŸ“š Annual GDPR Training: All personnel with data access (yearly refresh)
  • šŸ“š Annual Security Awareness: Phishing, social engineering, password security
  • šŸ“š Incident Response Training: How to report and respond to security incidents

Phishing Simulations:

  • šŸŽ£ Quarterly Simulations: Test employee awareness
  • šŸŽ£ Targeted Training: Employees who click receive additional training

7.4 Access Termination

When employee leaves or role changes:

  • ā±ļø Immediate Access Revocation: Within 1 hour of termination/role change
  • ā±ļø Device Return: Company devices returned or remotely wiped
  • ā±ļø Password Changes: Shared passwords rotated
  • ā±ļø Exit Interview: Review confidentiality obligations

8. DATA BACKUP AND RECOVERY

8.1 Backup Strategy

Automated Backups:

TypeFrequencyRetentionEncryptionLocation
IncrementalDaily (2 AM UTC)30 daysAES-256Same region (London)
Full BackupWeekly (Sunday)30 daysAES-256Same region (London)
Database SnapshotsBefore every deployment7 daysAES-256Same region

What's Backed Up:

  • āœ… Database (PostgreSQL) - Account data, metadata, collaboration state
  • āœ… User-uploaded configurations
  • āœ… Application configurations

What's NOT Backed Up:

  • āŒ Your actual business data (stays in your database)
  • āŒ Uploaded files (deleted immediately, no backups created)
  • āŒ Query results (transient only, not stored)

8.2 Disaster Recovery

Recovery Objectives:

  • RPO (Recovery Point Objective): Maximum 24 hours of data loss
  • RTO (Recovery Time Objective): Service restoration within 4 hours

Disaster Scenarios:

ScenarioRecovery PlanRTO
Single server failureKubernetes auto-replaces< 5 minutes
Database corruptionRestore from latest backup< 1 hour
Data center failureManual failover to secondary region (planned)< 4 hours
Complete compromiseRestore from immutable backups< 4 hours

Backup Testing:

  • āœ… Quarterly Restore Tests: Verify backups can be restored successfully
  • āœ… Annual DR Drills: Full disaster recovery simulation

8.3 Backup Security

Protection:

  • šŸ”’ Immutable Backups: Write-once-read-many (WORM) storage prevents ransomware
  • šŸ”’ Separate Credentials: Backup access uses different credentials than production
  • šŸ”’ MFA Required: Multi-factor authentication for backup access
  • šŸ”’ Audit Logging: All backup access logged

8.4 Customer Responsibility

You are responsible for:

  • āœ… Backing up your own database (we don't have access to it)
  • āœ… Exporting important projects regularly
  • āœ… Maintaining long-term archives (we only keep 30 days)

How to Backup:

  • Account Settings → Export Data (JSON format)
  • Download all projects before account deletion
  • Use API (Enterprise) for automated backups

9. INCIDENT RESPONSE

9.1 Incident Response Plan

Detection → Containment → Investigation → Remediation → Recovery → Lessons Learned

9.2 Breach Notification

If a personal data breach occurs:

TimelineAction
Within 1 hourDetect and confirm breach
Within 4 hoursContain breach, prevent further unauthorized access
Within 24 hoursAssess scope and impact
Within 72 hoursNotify affected customers (GDPR requirement)
Within 7 daysProvide detailed incident report

What We'll Tell You:

  • āœ… Nature of the breach (what data was affected)
  • āœ… Likely consequences
  • āœ… Measures taken to address the breach
  • āœ… Measures you can take to protect yourself
  • āœ… Contact point for further information

9.3 Incident Classification

SeverityCriteriaResponse TimeEscalation
Critical (P1)Active breach, data exfiltration< 15 minutesCEO, CTO, all hands
High (P2)Potential breach, security vulnerability exploited< 1 hourCTO, Lead Engineer
Medium (P3)Security event, no data exposure< 4 hoursEngineering Lead
Low (P4)Minor security issue, no immediate risk< 24 hoursAssigned engineer

9.4 Communication

During incident:

  • āœ… Status Page: Real-time updates at status.flowframe.io (planned)
  • āœ… Email Notifications: Affected customers notified
  • āœ… Transparency: Honest communication about what happened

Post-Incident:

  • āœ… Incident Report: Detailed post-mortem within 7 days
  • āœ… Lessons Learned: What we learned and how we'll prevent recurrence
  • āœ… Remediation Plan: Steps taken to fix root cause

10. COMPLIANCE AND CERTIFICATIONS

10.1 Current Compliance Status

FrameworkStatusDetails
GDPRāœ… CompliantData Processing Agreement available, EU hosting, SCCs in place
CCPAāœ… CompliantCalifornia Consumer Privacy Act obligations met
UK GDPRāœ… CompliantUK data protection law compliance
ePrivacy Directiveāœ… CompliantCookie consent, email marketing compliance
ISO 27001🚧 Under evaluationInformation Security Management System
PCI DSSāœ… Via StripeWe don't handle card data directly (Stripe is PCI DSS Level 1)

10.2 Data Protection Impact Assessment (DPIA)

Customers may require DPIA if:

  • Processing likely to result in high risk to data subjects
  • Large-scale processing of special categories of data
  • Systematic monitoring of publicly accessible areas

Flowframe's Support:

  • āœ… Provide technical documentation for customer DPIA
  • āœ… Describe processing operations and purposes
  • āœ… Assess necessity and proportionality
  • āœ… Describe security measures

Request DPIA Support: support@flowframe.io

10.3 Sub-Processor Due Diligence

All sub-processors assessed for:

  • āœ… Security certifications (SOC 2, ISO 27001, etc.)
  • āœ… Data protection compliance (GDPR, CCPA)
  • āœ… Incident response capabilities
  • āœ… Encryption and access controls
  • āœ… Financial stability and reputation

Sub-Processors:

  • DigitalOcean: SOC 2 Type II, ISO 27001
  • Stripe: PCI DSS Level 1, SOC 2, ISO 27001
  • Google (Gemini, planned): SOC 2, ISO 27001, Zero Data Retention

11. THIRD-PARTY SECURITY

11.1 Sub-Processor Security Standards

All sub-processors must:

  • āœ… Sign Data Processing Agreements (DPAs)
  • āœ… Implement appropriate technical and organizational measures
  • āœ… Provide data breach notification procedures
  • āœ… Maintain security certifications (SOC 2, ISO 27001)
  • āœ… Comply with GDPR and applicable data protection laws
  • āœ… Submit to regular security audits

11.2 Vendor Risk Management

Vendor Assessment Process:

  1. Initial Assessment: Security questionnaire (SIG, CAIQ)
  2. Due Diligence: Review certifications, policies, incident history
  3. Contract Negotiation: Data Processing Agreement, SLAs, security requirements
  4. Ongoing Monitoring: Quarterly review, annual re-assessment
  5. Incident Tracking: Monitor for security incidents at vendor

Vendor Offboarding:

  • āœ… Data deletion confirmation
  • āœ… Access revocation
  • āœ… Certificate of destruction (if applicable)

11.3 Integration Security

For third-party integrations (databases, APIs):

  • āœ… Customer Controls: You manage your own database credentials
  • āœ… Read-Only Recommended: Use read-only credentials when possible
  • āœ… Encrypted in Transit: Credentials encrypted via TLS 1.3 during transmission
  • āœ… Encrypted at Rest: Credentials stored encrypted on Flowframe servers (AES-256)

12. SECURITY MONITORING

12.1 24/7 Monitoring

What We Monitor:

  • šŸ” Failed Login Attempts: Alert on brute force patterns
  • šŸ” Anomalous Traffic: Unusual traffic patterns, DDoS attempts
  • šŸ” Error Rates: Spikes in application errors (potential attack)
  • šŸ” System Performance: CPU, memory, disk usage anomalies
  • šŸ” Network Traffic: Unauthorized network connections
  • šŸ” Administrative Actions: All admin access logged and monitored

Alerting:

  • āš ļø Real-Time Alerts: Critical events trigger immediate alerts
  • āš ļø Escalation: On-call engineer notified within minutes
  • āš ļø Runbooks: Documented response procedures for common incidents

12.2 Logging and Audit Trails

Comprehensive Logging:

Log TypeRetentionContentEncryption
Application Logs90 daysUser actions, API callsAES-256
Access Logs90 daysAuthentication, authorizationAES-256
Admin Logs1 yearAll admin actionsAES-256
Security Logs1 yearSecurity events, failed loginsAES-256
Audit Logs3 yearsGDPR-related activities (DSAR, data deletion)AES-256

Log Analysis:

  • šŸ“Š Automated Analysis: Machine learning for anomaly detection (planned)
  • šŸ“Š SIEM (Security Information and Event Management): Planned Q3 2026
  • šŸ“Š Correlation: Correlate events across systems to detect complex attacks

12.3 Security Metrics

KPIs Tracked:

  • ā±ļø Mean Time to Detect (MTTD): How quickly we detect incidents
  • ā±ļø Mean Time to Respond (MTTR): How quickly we respond to incidents
  • šŸ“‰ Failed Login Rate: Indicator of brute force attempts
  • šŸ“ˆ Vulnerability Remediation Time: Time to patch vulnerabilities
  • šŸŽÆ Phishing Simulation Success Rate: Employee security awareness

13. VULNERABILITY MANAGEMENT

13.1 Security Updates

Patching Schedule:

  • 🚨 Critical Vulnerabilities: Within 24 hours
  • āš ļø High Severity: Within 7 days
  • šŸ“‹ Medium Severity: Within 30 days
  • šŸ“Œ Low Severity: Next quarterly maintenance window

Dependency Management:

  • āœ… Automated Scanning: GitHub Dependabot scans dependencies daily
  • āœ… Automated PRs: Dependabot creates PRs for security updates
  • āœ… Manual Review: All dependency updates reviewed before merging

13.2 Penetration Testing

External Penetration Testing:

  • šŸŽÆ Frequency: Under evaluation for future implementation
  • šŸŽÆ Scope: Full application and infrastructure penetration test
  • šŸŽÆ Provider: Independent third-party security firm
  • šŸŽÆ Report: Detailed findings and remediation recommendations

13.3 Vulnerability Disclosure

If you find a security vulnerability:

  1. Email: support@flowframe.io with subject "SECURITY VULNERABILITY REPORT"
  2. Provide: Description, steps to reproduce, potential impact
  3. Responsible Disclosure: Give us time to fix before public disclosure (90 days)
  4. Our Response:
    • Acknowledge receipt within 24 hours
    • Investigate and respond within 5 business days
    • Keep you updated on remediation progress

14. SECURITY BEST PRACTICES FOR CUSTOMERS

14.1 Account Security

Recommendations:

  • āœ… Use a strong, unique password (12+ characters)
  • āœ… Enable two-factor authentication (when available Q2 2026)
  • āœ… Don't share credentials with anyone
  • āœ… Use a password manager (1Password, Bitwarden, LastPass)
  • āœ… Log out when using shared computers

14.2 Database Security

Recommendations:

  • āœ… Use read-only database credentials when possible
  • āœ… Create a dedicated Flowframe user with minimal permissions
  • āœ… Enable IP whitelisting if your database supports it
  • āœ… Rotate credentials every 90 days
  • āœ… Don't use root/admin credentials
  • āœ… Monitor database access logs

Database User Permissions (Example for PostgreSQL):

-- Create read-only user for Flowframe
CREATE USER flowframe_readonly WITH PASSWORD 'strong-password-here';
GRANT CONNECT ON DATABASE your_database TO flowframe_readonly;
GRANT USAGE ON SCHEMA public TO flowframe_readonly;
GRANT SELECT ON ALL TABLES IN SCHEMA public TO flowframe_readonly;
ALTER DEFAULT PRIVILEGES IN SCHEMA public GRANT SELECT ON TABLES TO flowframe_readonly;

14.3 Data Handling

Recommendations:

  • āœ… Only upload data you're authorized to analyze
  • āœ… Anonymize or redact sensitive data before public sharing
  • āœ… Export and backup important analyses regularly
  • āœ… Delete old projects you no longer need
  • āœ… Use RBAC to limit team member access appropriately

14.4 Team Management

Recommendations:

  • āœ… Remove team members who leave your organization immediately
  • āœ… Use role-based access (don't give everyone Owner access)
  • āœ… Review team member list quarterly
  • āœ… Audit project sharing settings periodically
  • āœ… Educate team on security best practices

15. SECURITY ROADMAP

15.1 Current (Q1 2026) - Beta Phase

Implemented:

  • āœ… TLS 1.3 encryption
  • āœ… AES-256 encryption at rest
  • āœ… Client-side data processing (DuckDB WASM)
  • āœ… Role-based access control
  • āœ… EU data residency (London, UK)
  • āœ… GDPR compliance
  • āœ… Bcrypt password hashing
  • āœ… VPC network isolation
  • āœ… Automated backups
  • āœ… 24/7 security monitoring

15.2 Coming Q2 2026 - General Availability

Planned:

  • 🚧 Two-Factor Authentication (2FA): TOTP-based MFA
  • 🚧 SSO / SAML Integration (Enterprise): Single Sign-On
  • 🚧 Bug Bounty Program: Public vulnerability disclosure
  • 🚧 Security Vulnerability Disclosure Policy
  • 🚧 Enhanced Audit Logs: More granular activity tracking

15.3 Future (H2 2026 & Beyond)

Roadmap:

  • šŸ”® IP Whitelisting: For API access
  • šŸ”® Advanced Audit Logs: SIEM integration
  • šŸ”® Data Loss Prevention (DLP): Automated sensitive data detection
  • šŸ”® Customer-Managed Encryption Keys (CMEK): Bring your own encryption keys
  • šŸ”® Hardware Security Keys: FIDO2/YubiKey support
  • šŸ”® Passkeys / WebAuthn: Passwordless authentication

16. REPORTING SECURITY ISSUES

16.1 Vulnerability Reporting

Found a security vulnerability?

Contact: support@flowframe.io Subject: "SECURITY VULNERABILITY REPORT"

Please Include:

  • āœ… Description of the vulnerability
  • āœ… Steps to reproduce
  • āœ… Potential impact
  • āœ… Your contact information
  • āœ… Any proof-of-concept code (if applicable)

Our Response:

  • āœ… Acknowledge receipt within 24 hours
  • āœ… Investigate and respond within 5 business days
  • āœ… Keep you updated on remediation progress
  • āœ… Credit you in security advisory (if you wish)
  • āœ… Potential bounty reward (once program launches Q2 2026)

16.2 Responsible Disclosure

We ask that you:

  • āœ… Give us 90 days to fix the vulnerability before public disclosure
  • āœ… Don't exploit the vulnerability beyond proof-of-concept
  • āœ… Don't access other users' data
  • āœ… Don't perform DoS attacks or service disruptions
  • āœ… Don't publicly disclose until we've fixed the issue

In return, we promise:

  • āœ… No legal action against security researchers acting in good faith
  • āœ… Transparent communication and updates
  • āœ… Public recognition (if you wish)
  • āœ… Fair bounty rewards (once program launches)

SUMMARY

Flowframe implements enterprise-grade security:

  • šŸ”’ Dual Architecture: Secure cloud DB queries + encrypted file storage (AES-256)
  • šŸ” End-to-End Encryption: TLS 1.3 in transit, AES-256 at rest
  • šŸ‡ŖšŸ‡ŗ EU Data Residency: GDPR-compliant hosting in London, UK
  • āœ… Compliance: GDPR, CCPA
  • šŸ›”ļø Zero Trust Architecture: Least privilege, MFA, network isolation
  • šŸ“‹ Audit Ready: Comprehensive logging, incident response, breach notification
  • šŸ—‘ļø Immediate Deletion: Files deleted instantly on request (no backups)

Questions? Contact us at support@flowframe.io


Last Updated: January 10, 2026 Version: 1.0 Next Review: April 2026


For more security information:


We take security seriously. If you have suggestions for improving our security posture, we'd love to hear from you at support@flowframe.io.


END OF SECURITY PAGE

Questions about this document?

Contact us at support@flowframe.io