SureshakeDocs

Security

How Sureshake approaches authentication, access, and data protection.

This page explains security controls in user-facing terms.

Authentication and authorization

  • Authentication verifies who is accessing the platform.
  • Authorization controls what each user can do per entity and workflow.
  • Role assignments should follow least privilege.

Data handling and protection

  • Sensitive data should be shared only with scoped recipients.
  • Access paths should be auditable.
  • Sharing defaults should minimize accidental over-exposure.

Operational security best practices

  • Review permissions regularly.
  • Remove stale access for users and recipients.
  • Use time-bound external sharing where possible.
  • Pair high-impact actions with explicit review.

Validation checklist

  • Role permissions are reviewed for each entity
  • External shares are scoped and auditable
  • Stale access cleanup is part of operating cadence
  • Security-sensitive workflows are documented for team use

On this page