Compliance & Security

SOC 2 compliance infrastructure with audit logging, encryption, row-level security, and a compliance dashboard.

Audit Logging

Every write operation across all API endpoints is logged with the following data: user ID, IP address, timestamp, endpoint, HTTP method, and a before/after snapshot of the affected record. Audit logs are immutable and retained for 7 years.

FieldDescription
User IDThe authenticated user who performed the action
IP AddressClient IP at the time of the request
TimestampUTC timestamp with millisecond precision
EndpointThe API route that was called
MethodHTTP method (POST, PUT, PATCH, DELETE)
BeforeSnapshot of the record before the change
AfterSnapshot of the record after the change

Info

Read operations are not audit-logged by default. Enable read logging per module in Settings if required for your compliance posture.

Encryption

All data at rest is encrypted with AES-256-GCM. Sensitive PII fields -- including SSNs, bank account numbers, and tax IDs -- use application-layer encryption on top of database-level encryption. Data in transit is protected with TLS 1.3.

Row-Level Security

Every database table enforces row-level security (RLS) policies. Users can only access records belonging to their organization. RLS is enforced at the database layer, not the application layer, so it cannot be bypassed by application bugs.

Role-Based Access Control

Eight roles and 10 permission types enforce least-privilege access across the platform.

RoleAccess Level
OwnerFull access to all modules and settings
AdminAll modules except billing and ownership transfer
DispatcherDispatch, loads, GPS, and driver communication
AccountantFinance, payroll, invoicing, and tax reports
Safety ManagerCompliance, HOS, DVIR, and drug testing
DriverOwn HOS, loads, documents, and pay stubs
ViewerRead-only access to dashboards and reports
APIProgrammatic access scoped to specific endpoints

Compliance Dashboard

The compliance dashboard provides a security posture score based on your organization's configuration: MFA adoption, role distribution, encryption status, and audit log coverage. Review recent audit events, export logs for external auditors, and track remediation items.

Tip

Access the compliance dashboard from Settings → Security → Compliance. Export audit logs as CSV for external audit submissions.