Tenant İzolasyonu & Veri Güvenliği

Tenant izolasyonu, data güvenliği, audit log, compliance.

Audience: Admin, Security, Compliance Page Type: Concept Summary: COS multi-tenant architecture, complete data isolation, audit capabilities.


Tenant Architecture

COS Platform (Single instance)

  ├─ Tenant 1 (Company A)
  │  ├─ Database rows (tenant_id = ABC123)
  │  ├─ Users (isolated)
  │  ├─ OKR data (isolated)
  │  └─ Audit log (isolated)

  ├─ Tenant 2 (Company B)
  │  ├─ Database rows (tenant_id = XYZ789)
  │  ├─ Users (isolated)
  │  ├─ OKR data (isolated)
  │  └─ Audit log (isolated)

  └─ Tenant N

Isolation Mechanisms

1. Database Level

2. Request Level

3. Row-Level Security (RLS)


Authentication & Authorization

User Authentication

Request Authorization


Audit Logging

What Gets Logged

Access Audit Log

  1. Admin → Audit Log

  2. Filters available:

    • Date range

    • Entity type (User, OKR, etc.)

    • Action (create, update, delete)

    • User (who did it)

  3. Detail view: Full before/after snapshot

Audit Trail Use Cases


Encryption

In Transit (TLS/SSL)

  • All API calls encrypted (HTTPS)

  • No plaintext data over network

At Rest

  • Database: TBD (check with IT)

  • Backups: Encrypted

  • Sensitive fields: Additional encryption (passwords, etc.)


Data Retention

Active Data

  • Kept indefinitely (while tenant active)

  • Accessible via COS interface

Archived Data

  • Closed quarters archived (still queryable)

  • Historical OKR data retained (3+ years)

  • Audit logs retained (7 years minimum for compliance)

Deleted Data

  • User deactivation: Data retained, access removed

  • OKR delete: Soft delete (recoverable by admin)

  • Hard delete: Requires explicit admin + confirmation


Backup & Disaster Recovery

Backup Schedule

  • Daily automated backups

  • Retention: 30-day rolling backup

  • Geographic redundancy (TBD location)

Recovery Process

  1. Contact support with date/scope needed

  2. Support verifies approval

  3. Restore from backup (estimated time: 4-24 hours)

  4. Data integrity verification

  5. Restoration applied


Compliance Frameworks

Supported Standards

  • SOC 2 (TBD audit status)

  • GDPR compliance (data residency, right-to-delete)

  • Industry-specific (HIPAA, PCI, etc. - check with support)

Data Residency

  • Default: [Region TBD]

  • EU data: [EU region option TBD]

  • Custom requests: Contact sales


Access Control

IP Whitelisting

  • TBD (available if required)

  • Contact admin for setup

Session Management

  • JWT tokens: 24-hour expiry

  • Automatic logout: 60 min inactivity (TBD)

  • Concurrent sessions: 1 per user (optional multi-session)

RBAC Fine-Grain Control

Feature
MEMBER
LEAD
MGR
ADMIN
CEO

View data

Own

Unit

Org

Tenant

Org

Edit data

Own

Unit

Org

Tenant

Org

Delete

-

-

-

Tenant

-

Audit log

-

-

-

Tenant

-


Incident Response

Report Security Issue

Contact: [email protected]

Include:

  • Description of issue

  • Steps to reproduce

  • Tenant ID (if relevant)

  • Impact assessment


Best Practices

For Admins:

  • Regularly review audit logs

  • Limit ADMIN role assignments

  • Monitor unusual activity patterns

  • Enable 2FA (if available)

For Users:

  • Use strong passwords

  • Don't share credentials

  • Logout from shared computers

  • Report suspicious access


Troubleshooting

Q: "Başka tenant'ın verilerini gördüm" A: Immediate security incident. Contact support + admin. Check audit logs.

Q: "Audit log'u göremiyorum" A: Requires ADMIN role. Check your role in profile.

Q: "Data backup gerekli" A: Contact support with date/scope. 4-24 hour typical.


İlgili Sayfalar

Last updated