Beezifi Inc. is committed to maintaining the confidentiality, integrity, and availability of all data entrusted to our platform. We apply security controls at every layer of the stack — from the database schema to the HTTP response headers — and treat security as an ongoing operational discipline rather than a one-time configuration.
We believe in transparency. This document explains precisely what we do to protect your data and what we expect from you as an administrator or user of the platform.
Technical implementation:
crm_ followed by the workspace slug (e.g., crm_acme).beezificrm) with no access to workspace data except through explicit, audited database connections.All passwords are hashed using bcrypt with a work factor of 10 before storage. We never store, log, or transmit plaintext passwords at any point. Password reset flows issue short-lived, single-use tokens only.
The platform uses JSON Web Tokens (JWT) for session management. Tokens are:
Every user account — including system administrators — can enable TOTP-based two-factor authentication compatible with Google Authenticator, Authy, 1Password, and any RFC 6238-compliant app. When enabled:
We strongly recommend enabling TOTP for all admin accounts.
Every API endpoint enforces role-based access controls. The platform supports five roles with increasingly restrictive permissions:
Role assignments are enforced at the API middleware layer. Attempting to call an endpoint above your role returns a 403 Forbidden response with no data exposure.
Authentication endpoints (login, TOTP verification) are rate-limited per IP address to prevent brute-force attacks. Excessive failed attempts result in temporary lockout at the network layer.
All communication between clients and the platform is encrypted using TLS 1.2 or higher. HTTP connections are redirected to HTTPS. Strict-Transport-Security (HSTS) headers are set to enforce this in supporting browsers.
Sensitive fields (TOTP secrets) are encrypted at the application layer before storage. All databases reside on encrypted storage volumes at the infrastructure level.
All passwords are bcrypt-hashed. API secrets, JWT signing keys, and database credentials are stored in environment variables, never in source code or version control.
Database backups are encrypted at rest. Backup access is restricted to authorized infrastructure personnel through audited processes.
The API server uses Helmet.js to apply a suite of HTTP security headers on every response, including:
Content-Security-Policy — restricts sources of scripts, styles, and other resourcesStrict-Transport-Security — enforces HTTPS for all future requestsX-Frame-Options: DENY — prevents clickjacking via iframe embeddingX-Content-Type-Options: nosniff — prevents MIME-type sniffing attacksReferrer-Policy — controls referrer information sent with requestsAll database queries use parameterized statements via the mysql2 driver. User-supplied input is never interpolated directly into SQL strings. Tenant slugs and identifiers are validated against strict regular expressions before use in any database or filesystem operation.
Cross-Origin Resource Sharing (CORS) is configured to allow only trusted origins. Requests from untrusted origins are rejected at the network layer.
We use a minimal, well-maintained set of production dependencies. All packages are pinned to specific versions. We run automated vulnerability scans on the dependency tree as part of our deployment process.
Every significant action within a workspace is written to an append-only audit log, including:
Audit records are timestamped in UTC and attributed to the authenticated user who performed the action. Audit logs are readable by workspace admins and are not modifiable by any application user. System-level audit logs (infrastructure access, admin panel actions) are maintained separately and retained for a minimum of one year.
We monitor infrastructure and application logs for anomalous patterns, including unusual authentication activity, unexpected data access volumes, and dependency vulnerability alerts.
In the event of a confirmed security incident:
Breach notifications are sent to the admin email address on file for each affected workspace. If you suspect your workspace has been compromised, contact us immediately at security@beezifi.com. Include your workspace name, the nature of the suspected issue, and any supporting details.
Security is a shared responsibility. As a workspace administrator or user, you are responsible for:
We welcome responsible disclosure of security vulnerabilities. If you discover a potential security issue in our platform, please report it to us before public disclosure so we can investigate and remediate it.
Report to: security@beezifi.com
Please include in your report:
Our commitment to you:
Please do not access, modify, or delete data belonging to other workspaces during testing. Conduct all testing against workspaces you own.
Email: security@beezifi.com
For general privacy questions: privacy@beezifi.com
For legal inquiries: legal@beezifi.com
For urgent security incidents, please mark your email subject line with [URGENT SECURITY].