Security
How Sureshake approaches authentication, access, and data protection.
This page explains security controls in user-facing terms.
Authentication and authorization
- Authentication verifies who is accessing the platform.
- Authorization controls what each user can do per entity and workflow.
- Role assignments should follow least privilege.
Data handling and protection
- Sensitive data should be shared only with scoped recipients.
- Access paths should be auditable.
- Sharing defaults should minimize accidental over-exposure.
Operational security best practices
- Review permissions regularly.
- Remove stale access for users and recipients.
- Use time-bound external sharing where possible.
- Pair high-impact actions with explicit review.
Validation checklist
- Role permissions are reviewed for each entity
- External shares are scoped and auditable
- Stale access cleanup is part of operating cadence
- Security-sensitive workflows are documented for team use