Security & Trust

Built for sensitive professional data

Clarity Workflow is designed specifically for insolvency and accounting practitioners. We take the security, confidentiality, and integrity of your client matter data seriously.

This page describes the security controls that are actually implemented and active in the Clarity Workflow platform. We only state what we can back up. Where features are still being rolled out, we say so clearly. If you have a question not answered here, contact us.

Account & Access Control

Invitation-Only Registration

New accounts can only be created using a secure invitation link sent by the firm owner. Open self-registration is not available.

Strong Password Requirements

Passwords must meet complexity requirements — minimum 8 characters with uppercase, lowercase, numbers, and special characters. Common passwords are blocked.

Two-Factor Authentication (2FA)

TOTP-based two-factor authentication is available for all accounts and can be required for all users by the firm owner. Backup recovery codes are provided.

Automatic Account Lockout

Accounts are automatically locked after repeated failed login attempts, with a timed cooldown period. You receive an email alert when this occurs.

Role-Based Permissions

A role hierarchy (owner, senior, user, viewer) is enforced server-side on every API request. Each role has clearly defined permissions. Privilege changes require owner approval.

Re-Authentication for Sensitive Actions

Actions such as revoking sessions, changing passwords, and modifying team settings require re-entry of your authenticator code for additional verification.

Data Isolation & Multi-Tenancy

Data in Transit

Data Storage & Encryption at Rest

File Upload & Document Security

Infrastructure & Hosting

Component Detail Status
Cloud Provider Microsoft Azure — Australia East region Active
Compute Azure Virtual Machine with platform-managed disk encryption Active
File Storage Azure Blob Storage — all containers private, anonymous access disabled Active
CDN & DDoS Protection Cloudflare proxy — SSL/TLS DDoS protection, Network-layer DDoS mitigation Active
Web Application Firewall Cloudflare Managed WAF Ruleset (web application exploits, DDoS, bot traffic, API abuse) Active
Bot Protection Cloudflare Bot Fight Mode with JS detections Active
Malware Scanning Azure Defender for Storage — On-Upload Malware Scanning Active
Error Monitoring Sentry — real-time exception tracking and alerting Active
Performance Monitoring Azure Application Insights — request tracing, failure rate, availability monitoring Active
Alerting Azure Monitor alert rules — VM availability, CPU, memory, disk, failed requests, server exceptions Active
TLS Version TLS 1.3 preferred, TLS 1.2 minimum. Older versions blocked. Active
Secret Management Azure Key Vault — encryption keys and credentials stored outside the codebase, loaded at startup via Managed Identity Active
Email Authentication SPF, DKIM, and DMARC (p=quarantine) — prevents spoofing of notification and security emails from this domain Active

Audit Logging & Accountability

Application Security Controls

Rate Limiting

All API endpoints are rate-limited. Authentication endpoints have stricter limits to prevent brute-force attacks. Limits are enforced both at the application layer and at the Cloudflare network layer.

Security Headers

All responses include a strict Content Security Policy (CSP) with per-request nonces, HSTS, X-Frame-Options, X-Content-Type-Options, and Referrer-Policy headers.

Input Validation

All API inputs are validated server-side. The application rejects invalid Content-Types, oversized payloads, and malformed data before processing.

XSS Protection

User-supplied data is HTML-escaped before insertion into the DOM. Inline scripts in HTML responses use per-request CSP nonces to prevent code injection. Dangerous HTML is parsed in inert documents, not live DOM.

Secure Session Handling

Session tokens are validated against the database on every request. Expired, revoked, or force-logged-out sessions are rejected immediately. Session expiry warnings appear 5 minutes before automatic logout.

Secrets Management

All secrets (JWT signing keys, encryption keys, API credentials) are stored in Azure Key Vault and loaded at startup via Managed Identity. No secrets are stored in the codebase or source control.

Backups & Recovery

Responsible Disclosure

Report a Security Vulnerability

If you discover a security vulnerability in Clarity Workflow, we want to know about it. Please report it to us privately so we can address it before it can be exploited.

Email: admin@clarityworkflow.com
Response commitment: We will acknowledge receipt within 2 business days and provide a status update within 7 business days.

Please include a description of the vulnerability, the steps to reproduce it, and any evidence you have collected. We will not take legal action against researchers who act in good faith.

A machine-readable disclosure policy is published at /.well-known/security.txt in accordance with RFC 9116.

Honest Limitations

We believe in being transparent about what is and is not yet in place, rather than overstating our security posture. The items below are in-progress or planned, alongside controls that have recently been completed:

Questions & Contact

If you have a question about security that isn't answered here, or if you are a prospective user evaluating Clarity Workflow for use with sensitive client matter data, we are happy to discuss our architecture and controls in more detail.

Security Contact

For vulnerability reports or security questions: admin@clarityworkflow.com

General Support

For all other questions, use the in-app Support page or contact us through your registered email address.