Security
Enterprise-grade security protecting your department's sensitive data
Security First: Beacon35 is built with security as a foundational principle, not an afterthought. We implement industry-leading practices to protect your incident reports and personnel data.
Core Security Architecture
Secure Cloud Infrastructure
Beacon35 runs on secure cloud infrastructure with enterprise security measures, automatic backups, and high availability. Your data is protected with industry-standard security at every layer.
Authentication & Access Control
Password Security
- Secure Hashing: Passwords are hashed using industry-standard cryptographic algorithms
- Irreversible Protection: Even in the event of a database breach, passwords remain secure and cannot be reversed
- Password Requirements: Enforced minimum complexity standards
- Google Sign-In: Optional SSO via Google for passwordless authentication
Session Management
- Token-Based Authentication: Secure signed tokens issued for each authenticated session
- Automatic Expiration: Tokens expire automatically and are refreshed securely
- Custom Claims: Role and permission data embedded in authentication tokens for efficient access control
Multi-Factor Authentication (MFA)
- Optional TOTP-based two-factor authentication
- Recovery codes for account access
Role-Based Access Control
Beacon35 implements granular permission controls with four access levels:
Global Admin
Full system access including user management, department configuration, and all data across departments
Chief
Department-level administration, user management, report approval, and team oversight
Officer
Report approval, department data access, and operational management
Firefighter
Create and submit reports, view department data, access assigned resources
Network & Application Defense
Cloud Infrastructure Protection
- DDoS Mitigation: Built-in distributed denial-of-service protection at the infrastructure level
- TLS Encryption: All data in transit is encrypted with TLS
- Rate Limiting: Protection against brute force and enumeration attacks
- Request Verification: Verification that requests originate from legitimate app instances
Application Security
- Database Security: Granular security rules enforce data access controls at the database level
- XSS Protection: Input validation and HTML escaping
- Authentication Tokens: Cryptographic token verification on all API requests
- Input Validation: Server-side validation of all user input
Compliance & Standards
Beacon35 is built with awareness of industry-recognized security frameworks:
OWASP Top 10
Security Practices
- Code Review: Security-focused code reviews for all changes
- Dependency Monitoring: Tracking of third-party package vulnerabilities
- Infrastructure Security: Hosted on enterprise-grade cloud infrastructure with industry security certifications
Audit Logging & Monitoring
Comprehensive activity logging provides complete accountability:
- User Authentication: All login attempts (successful and failed)
- Data Access: Views, edits, and deletions of incident reports
- Administrative Actions: User creation, permission changes, configuration updates
- Password Events: Changes, resets, and recovery attempts
- Account Lockouts: Failed login attempts and security events
- Export Events: Data exports and report generation
Activity logs are accessible via the Admin dashboard and can be exported for compliance purposes.
Data Protection
Encryption
- In Transit: TLS encryption for all data transmission
- At Rest: Default encryption for all stored data at the infrastructure level
- Backups: Automatic backups provided by our cloud infrastructure
Data Isolation
- Multi-tenant architecture with strict data separation
- Department-level data isolation
- Database-level access controls
Incident Response
In the unlikely event of a security incident, we have procedures in place to:
- Detect and contain the incident within 24 hours
- Notify affected customers within 72 hours
- Provide detailed incident reports and remediation steps
- Implement corrective measures to prevent recurrence
Security Disclosure
We welcome responsible disclosure of security vulnerabilities. If you discover a security issue:
- Email us at security@beacon35.com
- Provide detailed information about the vulnerability
- Allow us reasonable time to address the issue before public disclosure
- We will acknowledge your report within 48 hours
Security Questions?
For security-related questions or to report a vulnerability:
- Email: security@beacon35.com
- Contact form: Contact Us