Skip to main content

Data Security & Governance Report

Version: 1.0 | Last Updated: January 2026 | Classification: Public
Auction Excellence is a cloud-native parking lot management and quality inspection platform built on enterprise-grade infrastructure with security-first architecture. This document outlines our data security controls aligned with SOC 2 Type II trust service criteria.

Security Controls

Infrastructure Security

Cloud Provider

Supabase (built on AWS infrastructure) with SOC 2 Type II certification

Data Encryption

AES-256 encryption at rest; TLS 1.3 encryption in transit

Network Isolation

Virtual Private Cloud (VPC) with isolated tenant environments

DDoS Protection

Enterprise-grade protection via Cloudflare and AWS Shield

Authentication & Access Control

ControlImplementation
AuthenticationJWT-based authentication with secure token management
Password PolicyMinimum 8 characters with complexity requirements; bcrypt hashing
Session ManagementConfigurable session timeouts with secure refresh token rotation
Role-Based AccessGranular permissions (Team Member, Administrator, Super Admin)

Multi-Tenant Data Isolation

All data access is enforced at the database level through PostgreSQL Row-Level Security (RLS) policies. There is no application-level bypass possible.
  • Row-Level Security (RLS): PostgreSQL RLS policies enforce strict tenant isolation at the database level
  • Auction-Based Segmentation: All core data tables include auction_id foreign key with enforced RLS
  • Cross-Tenant Prevention: Database-level policies prevent any cross-tenant data access

Availability Controls

ControlImplementation
Uptime SLA99.9% availability (Supabase Pro tier)
Database BackupsDaily automated backups with 7-day retention; point-in-time recovery
Disaster RecoveryMulti-region replication capabilities; RPO < 24 hours
MonitoringReal-time health monitoring with Sentry error tracking

Confidentiality Controls

Data Classification

Data TypeProtection Level
User DataEmail, name, role assignments — encrypted at rest
Operational DataLot submissions, inspections, problem reports — tenant-isolated
Imported DataThird-party historical data — same protections as native data

Access Restrictions

  • Service role keys restricted to server-side operations only
  • Anonymous keys limited to authenticated user scope via RLS
  • Admin functions require elevated role verification
  • Audit logging for administrative actions

Data Handling

Data retained per customer agreement; deletion available upon request.
Authorized users can export their organization’s data via admin dashboard.
Cascade deletion policies ensure complete data removal when requested.

Processing Integrity

  • Input Validation: Zod schema validation on all form inputs (mobile and admin)
  • Type Safety: Full TypeScript coverage with strict compilation
  • Database Constraints: Foreign keys, check constraints, and triggers enforce data integrity
  • Optimistic Updates: Rollback mechanisms prevent partial data corruption

Third-Party Data Import Security

When importing historical data from external systems:
1

Secure Transfer

Data imported via authenticated API endpoints or secure CSV upload
2

Validation

All imported records validated against schema before insertion
3

Tenant Assignment

Imported data automatically scoped to importing organization
4

Audit Trail

Import operations logged with timestamp and user attribution

Compliance Alignment

FrameworkStatus
SOC 2 Type IIInfrastructure provider certified; application controls aligned
GDPRData minimization, right to deletion, export capabilities
CCPAConsumer data rights supported

Incident Response

1

Detection

Automated error monitoring via Sentry with real-time alerts
2

Response

Documented incident response procedures activated
3

Communication

Customer notification within 72 hours of confirmed breach
4

Remediation

Root cause analysis with preventive measures implemented

Contact

For security inquiries or to request additional documentation:
This document provides an overview of security controls. Detailed policies available upon request under NDA.