Your security is our priority
Fenicia implements enterprise-level security controls aligned with SOC 2, ISO 27001, and OWASP to protect your business and customer data.
Data Encryption
AES-256-GCM for data at rest and TLS 1.2+ for data in transit. Keys managed by AWS KMS.
- End-to-end encryption
- Automatically rotated keys
- Envelope encryption pattern
Access Management
Role-based access control (RBAC) with 28+ resources and granular permissions.
- Multi-factor authentication (MFA)
- Signed JWT tokens (RS256)
- Principle of least privilege
Secure Infrastructure
Serverless architecture on AWS with multiple layers of protection.
- AWS WAF against OWASP Top 10
- Rate limiting and throttling
- Network isolation (VPC)
24/7 Monitoring
Continuous threat and anomaly surveillance in real time.
- Event correlation
- Automatic alerts
- On-call response team
Multi-Tenant Isolation
Each customer's data is completely isolated at the application and database level.
- Required TenantId in queries
- No cross-access possible
- Access auditing
Complete Audit
Immutable logging of all sensitive actions for compliance and forensics.
- Structured JSON logs
- 2-year retention
- End-to-end traceability
Data Protection
We implement industry best practices to protect sensitive information.
Encryption
Data Retention
| Data Type | Retention |
|---|---|
| Order data | 7 years |
| Customer records | Account life + 2 years |
| Security logs | 1 year |
| Audit logs | 2 years |
| Backups | 30 days rolling |
Incident Response
We have established procedures to detect, contain, and respond to security incidents.
Trusted Providers
We only work with providers that meet the highest security standards.
| Provider | Purpose | Certifications |
|---|---|---|
| AWS | Cloud infrastructure | SOC 2ISO 27001PCI DSS |
| MongoDB Atlas | Database | SOC 2ISO 27001HIPAA |
| Firebase | Authentication | SOC 2ISO 27001 |
| Stripe | Payment processing | PCI DSS Level 1 |
| Mercado Pago | LATAM Payments | PCI DSS |
Security Contact
If you have questions about our security policy or want to report a vulnerability, contact us.
Last updated: March 11, 2026
