Security
Security practices and data protection for the Uru platform
Security-First Architecture
Uru implements security best practices throughout the platform to protect your business data and operations.
Data Protection
Encryption
- Data in Transit: HTTPS/TLS encryption for all data transmission
- API Keys: AES-256-GCM authenticated encryption for stored API keys
- Password Storage: Bcrypt hashing for user passwords
- Database Security: Supabase PostgreSQL with built-in encryption
Data Isolation
- Multi-tenancy: Complete workspace-based data isolation
- Row-Level Security: PostgreSQL RLS policies enforce workspace boundaries
- Workspace Isolation: All data queries automatically filtered by workspace context
Authentication & Access Control
Authentication Methods
- JWT Tokens: Short-lived access tokens (1 hour) with workspace-specific claims
- Refresh Tokens: Secure refresh token rotation with 30-day expiry
- API Keys: User-generated API keys with scoped permissions for external access
- Session Management: Device tracking and IP logging for security monitoring
- Token Blacklisting: Immediate token revocation capability
Access Controls
- Role-Based Access: Workspace member roles (owner, admin, member)
- Workspace Isolation: Users only access their authorized workspaces
- Integration Management: OAuth connections managed via Composio SDK
- Activity Logging: Comprehensive audit logs for authentication and actions
Infrastructure Security
Platform Infrastructure
- Database: Supabase PostgreSQL with managed security and backups
- Containerization: Docker-based microservices architecture
- Service Separation: Frontend, backend, and MCP proxy as isolated services
- Environment Isolation: Separate development and production environments
Application Security
- Input Validation: Server-side validation for all user inputs
- CORS Configuration: Controlled cross-origin resource sharing
- Rate Limiting: API rate limiting to prevent abuse
- Security Headers: HTTP security headers for browser protection
Monitoring & Logging
Activity Monitoring
- Activity Logs: Comprehensive logging of user actions and system events
- Authentication Tracking: Login attempts, session creation, and token usage
- Integration Activity: Third-party integration connections and disconnections
- Tool Execution Logs: Records of all tool calls and API interactions
Data Privacy
- Data Minimization: We only collect data necessary for service delivery
- User Control: Users can export and delete their data
- Third-Party Integrations: OAuth tokens managed securely via Composio
- Transparent Practices: Clear privacy policy and data handling practices
Data Backup & Recovery
Database Backups
- Managed Backups: Supabase provides automated database backups
- Point-in-Time Recovery: Database restoration capabilities
- Data Retention: Backup retention policies for data recovery
Reporting Security Issues
If you discover a security vulnerability, please report it to our team:
- Email us at support@uruenterprises.com with details
- Include steps to reproduce the issue if possible
- We will respond promptly to investigate and address the concern
Security Contact
For security concerns or questions about our security practices:
Support: support@uruenterprises.com
LinkedIn: linkedin.com/company/uru-enterprises
Security is an ongoing commitment. We continuously work to improve our security practices to protect your business data and operations.