Security Policy
Last updated: November 22, 2025
Overview of the infrastructure, operational safeguards, and disclosure process that keep the Akangbou platform trustworthy.
Infrastructure & Hosting
- Akangbou is hosted on Vercel with regional edge caching; data is stored in Supabase (Postgres) with row-level security enforced.
- All traffic is encrypted via TLS 1.2+ and we use HSTS to prevent downgrade attacks.
- Secrets are managed through Vercel + Supabase encrypted stores—no credentials live in the codebase.
Application Security
- We enforce session revocation and rotate service role keys when team members depart.
- Sentry monitors runtime errors and unusual patterns in reservation or payment flows.
- Automated dependency scanning runs through GitHub Dependabot and npm audit.
Data Protection
- Customer data is segmented by organization using Supabase RLS policies. Only the owning team can read or mutate their records.
- Backups are taken daily and retained for 30 days. Restoration tests run monthly.
- PII exports (attendee CSVs, waitlist downloads) are watermarked and logged.
Incident Response
We classify incidents as P1 (active exploitation), P2 (potential exploit), or P3 (informational). P1 incidents trigger an on-call rotation and customer notification within 24 hours. All incidents receive a postmortem that documents scope, impact, remediation, and preventive actions.
Vulnerability Reporting
Report suspected vulnerabilities to security@akangbou.com with reproduction steps, impacted endpoints, and any proof-of-concept code. We aim to acknowledge reports within one business day and share remediation timelines within five business days. Public disclosure is prohibited until the fix ships.
Corporate & Employee Controls
- All staff use SSO, hardware security keys, and auto-locking laptops.
- Access to production data requires a business justification and auto-expires after seven days.
- We conduct annual security awareness training focused on phishing, data handling, and incident escalation.