Security at Every Layer
From infrastructure to application logic, security is not an afterthought at Arkan.
Row-Level Isolation
Every database query is scoped to the active company. Data never leaks between tenants, even in shared infrastructure.
AES-256 Encryption
All data encrypted at rest with AES-256. In-transit encryption via TLS 1.3 for every API call and client connection.
Audit Trails
Every action is logged with user, timestamp, IP address, and changed values. Immutable audit logs for compliance.
RBAC & Permissions
Granular role-based access control with module-level, record-level, and field-level permission scoping.
SOC 2 Compliance
Infrastructure and processes aligned with SOC 2 Type II, GDPR, and GCC data residency requirements.
Azure Infrastructure
Hosted on Microsoft Azure with geo-redundant backups, auto-scaling, and 99.9% uptime SLA guarantee.
Data Isolation
7 layers of data isolation
Arkan implements defense-in-depth for multi-tenant data isolation. Even if one layer is bypassed, six more stand between your data and unauthorized access.
Company Scope Guard
Every API request is automatically scoped to the authenticated company context.
Database Row-Level Security
PostgreSQL RLS policies enforce data isolation at the database engine level.
Service-Layer Validation
Business logic services validate company ownership before every read and write.
API Gateway Filtering
Request middleware strips and validates company context before routing.
Tenant Context Propagation
Company context is cryptographically bound to the session token.
Query Builder Scoping
ORM-level automatic WHERE clauses ensure no cross-tenant data access.
Audit & Anomaly Detection
Real-time monitoring flags any cross-tenant access patterns.
Encryption Standards
- AES-256 encryption for all data at rest
- TLS 1.3 for all data in transit
- Encrypted database backups with geo-redundancy
- Key rotation on a 90-day schedule
- Zero-knowledge architecture for sensitive fields
Compliance & Certifications
- SOC 2 Type II aligned processes
- GDPR-compliant data handling
- GCC data residency requirements met
- ZATCA e-invoicing compliance
- Regular third-party penetration testing