Beezifi
Beezifi Identity

Security Policy

Effective Date: May 8, 2026  |  Last Updated: May 8, 2026

Terms of Use Privacy Policy Security Policy

Beezifi Inc. takes security seriously. This Security Policy describes the technical and organizational safeguards implemented in the Beezifi Identity service (the "Service") to protect your account and authentication data. This policy is incorporated by reference into our Terms of Use and Privacy Policy.

Security is not an add-on — it is the foundation of Beezifi Identity. Every architectural decision is made with the assumption that the authentication layer is a high-value attack target.

1. Authentication & Credential Security

🔐
Password Hashing

bcrypt with work factor 12+. Passwords are never stored in plaintext.

🔑
Two-Factor Auth

TOTP-based 2FA (RFC 6238) available on all accounts. Admin accounts are strongly encouraged to enable it.

🎟️
JWT Sessions

JSON Web Tokens with short expiry windows, HS256 signing, issuer and audience validation.

🚦
Rate Limiting

Authentication endpoints are rate-limited (20 attempts per 15 minutes per IP) to prevent brute-force attacks.

2. Transport Security

All communication between clients and the Service is encrypted using TLS 1.2 or higher. Unencrypted HTTP connections are automatically upgraded to HTTPS. HTTP Strict Transport Security (HSTS) headers are enforced to prevent downgrade attacks.

3. HTTP Security Headers

The Service is hardened with the following HTTP security headers via Helmet.js:

4. CSRF Protection

All state-changing API endpoints require a valid CSRF token delivered via the X-CSRF-Token request header and validated against a double-submit cookie. This prevents cross-site request forgery attacks from malicious third-party pages.

5. OAuth2 Security

The OAuth2 authorization server implements the following safeguards:

6. Session Management

Sessions are stored server-side with an associated IP address, user agent, device fingerprint, and expiration timestamp. Users can view all active sessions and revoke individual sessions from their dashboard at any time. Sessions are automatically invalidated on password change.

7. Device Trust

The Service supports trusted device registration using browser fingerprinting. Trusted devices can be reviewed and revoked from the security settings panel. Device fingerprints are hashed before storage and are used only for session trust — never for tracking or profiling.

8. Access Policy Engine

Users can configure fine-grained access policies including:

Policy violations are logged and blocked in real time without user notification to prevent information leakage.

9. Audit Logging

Every significant action within the Service is recorded in an append-only audit log, including:

Audit logs are retained for compliance purposes and are available to account owners and administrators within the Service.

10. Data Isolation

Authentication data is stored in access-controlled, isolated database instances. There are no shared data layers between users. Even internal Beezifi staff accessing infrastructure for support purposes follow audited, role-gated processes.

11. Shared Responsibility

Security is a shared responsibility. To protect your account, you must:

12. Incident Response

In the event of a confirmed security incident affecting user data, Beezifi Inc. will:

13. Vulnerability Disclosure

If you believe you have discovered a security vulnerability in the Service, please report it responsibly to us before public disclosure:

Please do not publicly disclose vulnerabilities before we have had a reasonable opportunity to remediate them. We appreciate responsible disclosure and will credit researchers where appropriate with their consent.

14. Disclaimer

DESPITE THE SECURITY MEASURES DESCRIBED IN THIS POLICY, NO SYSTEM IS 100% SECURE. BEEZIFI INC. CANNOT GUARANTEE ABSOLUTE SECURITY OF DATA TRANSMITTED OVER THE INTERNET OR STORED ON OUR SYSTEMS. BEEZIFI INC. SHALL NOT BE LIABLE FOR ANY UNAUTHORIZED ACCESS, BREACH, OR LOSS OF DATA TO THE EXTENT SUCH INCIDENT RESULTS FROM CIRCUMSTANCES BEYOND OUR REASONABLE CONTROL, INCLUDING BUT NOT LIMITED TO YOUR FAILURE TO MAINTAIN ADEQUATE PASSWORD HYGIENE, FAILURE TO ENABLE AVAILABLE SECURITY FEATURES, OR COMPROMISE OF YOUR OWN DEVICE OR NETWORK. YOUR USE OF THE SERVICE IS AT YOUR OWN RISK AS FURTHER DESCRIBED IN OUR TERMS OF USE.

15. Governing Law

This Security Policy and any disputes arising out of or relating to it shall be governed by and construed in accordance with the laws of the State of Washington, United States, without regard to its conflict-of-law provisions. By using the Service, you consent to the exclusive jurisdiction of the courts located in Washington State for any matters not subject to arbitration under our Terms of Use.

16. Contact

For security questions or to report an incident:
Email: security@beezifi.com
Response target: 2 business days for security reports