Security & Infrastructure | Syntora
Syntora
Security & Infrastructure

Security by Default

Your automation runs on SOC 2-certified infrastructure with per-client data isolation. Not on a shared SaaS platform.

Where Your Data Lives

Infrastructure Partners

DigitalOcean

SOC 2 Type II Certified

All client infrastructure runs on DigitalOcean droplets. SOC 2 Type II means their security controls are independently audited and verified over time, not just at a point in time.

Vercel

Edge Network + DDoS Protection

Client-facing web applications deploy to Vercel's edge network with automatic SSL, DDoS mitigation, and global CDN. No origin server exposure.

Supabase

Row-Level Security + Encryption

Database layer with Postgres row-level security, automatic backups, encryption at rest, and SOC 2 Type II certification. Every query is scoped to the authenticated user.

Encryption & Access Control

Data Protection

AES-256 at Rest

All stored data is encrypted using AES-256, the same standard used by financial institutions and government agencies.

TLS 1.3 in Transit

Every data transfer between clients, servers, and databases uses TLS 1.3. No exceptions, no fallbacks to older protocols.

Row-Level Security

Supabase RLS policies ensure database queries only return data the authenticated user is authorized to see. Enforced at the database level, not the application level.

JWT Authentication

Token-based authentication with short-lived JWTs. No session storage on the server. Tokens are validated on every request.

How We Write Code

Code Practices

No Credentials in Repositories

Secrets live in environment variables, never in code. We use an env-vault pattern where .env.example files document required variables without exposing values.

Dependency Auditing

We audit third-party packages before inclusion. Minimal dependency trees reduce attack surface. We prefer standard library implementations where possible.

Code Review on Every Change

No code ships without review. Pull requests require approval before merge. CI/CD pipelines run linting, type checking, and build verification on every push.

Per-Client Architecture

Client Data Isolation

Every client gets their own Supabase project with a dedicated Postgres database. There are no shared databases between clients.

Row-level security policies are enforced at the database level. Even if application code had a bug, the database itself prevents unauthorized access. This is defense in depth.

Each project has its own authentication, storage buckets, and edge functions. Client A cannot access Client B's data by design, not by convention.

No Middleman

The Python Advantage

Some automation agencies route your data through third-party workflow platforms. Your API keys, client records, and business logic all live on someone else's SaaS.

We write Python. Your automation runs on infrastructure we control: DigitalOcean droplets, Supabase databases, and Vercel edge functions. No third-party platform sitting between your data and your automation.

This means fewer attack surfaces, clearer audit trails, and no dependency on a workflow platform's security posture. Your code, your infra, your data.

Questions about security?

We'll walk you through our infrastructure, access controls, and data handling practices.