Access control
Enterprise workspaces are permissioned by organization. Admin and privileged workflows route through authenticated server handlers, not public browser secrets.

Preparing tokens&
Loading the next builder or enterprise surface.
Loading
Preparing page
Loading product graph, proof, and adoption context.
LoadingThe platform is now prepared for enterprise security conversations: route-level hardening, RLS-backed database isolation, server-only privileged keys, production verification, and clear incident and data-handling boundaries.
Security scope
These controls describe the current product and operational posture. Final legal commitments belong in the MSA, DPA, order form, and SLA.
Enterprise workspaces are permissioned by organization. Admin and privileged workflows route through authenticated server handlers, not public browser secrets.
Supabase row-level security is enabled across the production public and enterprise tables, with policies reviewed through Supabase advisors.
Service-role keys, cron secrets, provisioning secrets, and integration encryption keys are expected only in server/runtime environments.
Production responses include HTTPS-only platform delivery, HSTS, frame protections, content-type protections, and a restrictive frame-ancestors policy.
Enterprise routes and scripts classify admin, cron, secret, callback, public, and session-scoped flows so risky endpoints stay visible during review.
Enterprise schemas include data request, audit, deletion cron, export job, and privacy-oriented data structures for customer review.
Incident response
Enterprise buyers will ask what happens when something goes wrong. This is the response model the team can operationalize.
Classify customer impact, affected systems, severity, and whether credentials or customer data may be involved.
Disable affected cron, API, or integration paths; rotate keys; pause exports or webhooks if needed.
Deploy the fix, verify production checks, inspect logs, and replay safe queued work from durable sources.
Provide customer-facing status, timeline, impact, remediation, and follow-up actions under the contract notice process.
Buyer-safe claims
These keep sales, product, and the website aligned with what can safely be represented today.
Answer from this page plus the enterprise packet; route edge cases to sales review.
Contract should name severity levels, response targets, and notification contacts.
Custom domain, signed legal documents, and contract-specific SLA are still business operations, not code.
The product has enough public evidence to begin review, and the final commitments can be placed into the enterprise order form.