Tenant isolation
@nebutra/tenantRequest-scoped tenant context (AsyncLocalStorage) plus Postgres Row-Level Security policies for hard tenant isolation at the database layer.
Security
The Sailor skeleton ships with audit logging, tenant isolation, encryption, and permission primitives as installable packages — not slideware.
Each item below is a package in this repository. Audit our source on GitHub.
@nebutra/tenantRequest-scoped tenant context (AsyncLocalStorage) plus Postgres Row-Level Security policies for hard tenant isolation at the database layer.
@nebutra/vaultEnvelope encryption with AWS KMS for customer secrets. Plaintext never leaves the application boundary; rotation-aware data encryption keys.
@nebutra/permissionsCASL for in-process role/attribute checks; OpenFGA adapter for Zanzibar-style relationship graphs at enterprise scale.
@nebutra/auditConsistent AuditEvent format with actor / action / resource / outcome attribution. Architecture in place; production integration in progress.
@nebutra/authPluggable Clerk / Better Auth / NextAuth backends — pick the right identity layer for your compliance posture without rewriting app code.
env validation + @nebutra/vaultRequired env vars validated at process start (Zod schema). Application secrets are decrypted on demand, never persisted to logs.
We list current state plainly — what is in place today versus what is on the roadmap. No badges we have not earned.
DPA available on request. Data subject access and deletion workflows in app.
Not currently certified. Architecture designed to support SOC 2 controls; formal audit planned.
Not currently certified. Tracking ISMS scope alongside SOC 2.
Audit logging, RBAC, and encryption primitives in place; a Business Associate Agreement is required for covered entities.
China-compatible providers (Bailian, Volcengine, SiliconFlow) supported for in-China data residency.
We respond to security inquiries within one business day. For DPA requests, attach your draft or use ours.