EnforceLayer

Security

EnforceLayer is designed as an enforcement-grade DNS monitoring platform. Below we describe how we protect data, infrastructure, and service integrity.

1. Security Philosophy

EnforceLayer is built around enforcement discipline.

We focus on:

  • Visibility
  • Configuration integrity
  • Drift detection
  • Measurable enforcement posture

We do not promise absolute protection.

We provide measurable improvement and monitoring of DNS-based email authentication controls.

2. Infrastructure Security

Hosting

EnforceLayer is hosted on Vercel infrastructure.

Infrastructure protections include:

  • Global CDN
  • Automatic HTTPS (TLS 1.2+)
  • DDoS mitigation at edge layer
  • Isolated serverless execution

We do not operate physical servers.

Data Storage

Data is stored in Supabase (PostgreSQL).

Security measures include:

  • Encrypted connections (TLS)
  • Role-based access
  • Database-level access controls
  • Restricted service key usage
  • Server-side environment isolation

Sensitive access keys are never exposed to the client.

Payment Security

Payments are processed by Stripe.

  • PCI compliance handled by Stripe
  • We do not store credit card numbers
  • Webhooks are verified via Stripe signature validation

Email Delivery

Monitoring alerts and service emails are delivered via:

  • Resend
  • Reputable infrastructure providers

SPF, DKIM, and DMARC are configured on our own sending domain.

3. Application Security

API Security

  • Authenticated endpoints
  • Token-based access control for reports
  • Signed webhook validation
  • Server-side enforcement of business logic

Report tokens are non-guessable and designed to prevent enumeration.

Access Control

Internal access to production systems is restricted.

  • Principle of least privilege
  • No public database access
  • Environment variable protection
  • Deployment via controlled pipeline

Encryption

  • All traffic encrypted via HTTPS
  • No plaintext transmission of sensitive data
  • Secure token handling

4. Monitoring & Integrity Controls

EnforceLayer continuously monitors:

  • DNS configuration changes
  • Enforcement drift
  • Alignment failures
  • Risk score degradation

Monitoring jobs run via scheduled infrastructure.

Security logging includes:

  • Access logs
  • Error logs
  • Webhook validation logs

5. What We Do NOT Do

To avoid misunderstanding:

  • We do not access private email inboxes
  • We do not store email message content
  • We do not intercept email traffic
  • We do not guarantee prevention of all spoofing
  • We do not modify DNS records on your behalf

We provide analysis and guidance.

DNS changes are performed by the domain owner.

6. Responsible Disclosure

If you believe you have discovered a security vulnerability, please contact:

security@enforcelayer.com
or
support@enforcelayer.com

Please include:

  • Description of the issue
  • Steps to reproduce
  • Impact assessment

We commit to reviewing valid reports promptly.

7. Service Limitations

EnforceLayer analyzes publicly available DNS records.

Limitations include:

  • Dependency on external DNS providers
  • Dependency on mail providers (Google, Microsoft, Zoho, etc.)
  • Propagation delays
  • Third-party infrastructure dependencies

Security posture improvements depend on correct DNS configuration.

8. Data Integrity & Backups

We implement:

  • Database redundancy
  • Infrastructure-level backup policies (via provider)
  • Controlled deployment workflows

However, no cloud system guarantees zero downtime.

9. Compliance Position

EnforceLayer:

  • Is not SOC 2 certified
  • Is not ISO 27001 certified
  • Is not a regulated financial institution

We rely on secure cloud infrastructure providers and enforce internal security discipline.

10. Continuous Improvement

Security is not static.

We regularly:

  • Review logging practices
  • Review token security
  • Improve drift detection logic
  • Harden subscription lifecycle validation
  • Improve abuse detection

11. Contact

General support:
support@enforcelayer.com