Trust Center

Security is foundational, not an afterthought

OperateEDU handles school operations data with the care it demands. Here's exactly what we've built and what's on our roadmap.

Implemented
In Progress
Planned

Infrastructure Security

Encryption in transit (TLS 1.2+)

All connections to OperateEDU use HTTPS with TLS 1.2 or higher. No unencrypted connections are accepted.

Encryption at rest (AES-256)

All data stored in our database is encrypted at rest using AES-256 via Supabase's managed PostgreSQL infrastructure.

Managed cloud hosting

Backend services run on Railway with automatic deployments from version-controlled code. Database hosted on Supabase with managed backups.

CDN-delivered frontend

Frontend is served via Cloudflare Pages with global edge caching, DDoS protection, and automatic HTTPS.

Automated database backups with documented recovery

Supabase provides daily automated backups. Documented recovery procedures and point-in-time restore testing are in progress.

Multi-region redundancy

Planned for future scale. Currently single-region with managed high availability from hosting providers.

Organizational Security

Role-based access control (RBAC)

Four user roles (superadmin, admin, operations, staff) with 40+ granular permission flags. Users only see what their role allows.

Feature-flag access control

Access to modules (workflows, reports, dashboards, assessments) is controlled by school plan and individual permission flags.

Custom role creation

Admins can create custom roles with a granular permission editor, starting from base presets or building from scratch.

Google Workspace SSO

Single sign-on via Google OAuth for schools using Google Workspace. Reduces password fatigue and centralizes authentication.

User deactivation and reactivation

Deactivated users are immediately locked out. Sessions are invalidated, but the user record and audit trail are preserved for compliance.

SOC 2 Type II certification

SOC 2 certification is on our roadmap as we scale. Current controls are designed to align with SOC 2 Trust Service Criteria.

Product Security

Session management with automatic timeout

Sessions expire after 45 minutes of inactivity with a 1-minute warning. Active sessions are tracked and can be invalidated on deactivation.

Rate limiting on authentication

Login, password reset, and sensitive endpoints are rate-limited to prevent brute-force attacks.

Forced password reset on first login

New users provisioned with temporary passwords must reset on first login. Passwords are hashed with pepper on the server.

Secure password hashing (pepper + hash)

Passwords are never stored in plaintext. All password hashing uses a server-side pepper combined with industry-standard hashing.

Full audit logging

Every workflow status change, admin action, login, and data access is logged with actor, timestamp, and details. Audit logs are searchable and exportable to CSV.

PII access logging

Access to personally identifiable information is logged separately for compliance and audit purposes.

Server-side plan limit enforcement

User count, domain, and feature access limits are being hardened with server-side validation to prevent client-side bypass.

Penetration testing by third party

Planned as part of our SOC 2 preparation. We welcome responsible disclosure at security@operateedu.com.

Internal Security Procedures

Version-controlled deployments

All code changes go through Git with branch protections. Deployments to production require staging verification first.

Environment variable management

All secrets, API keys, and credentials are stored as environment variables — never committed to source code.

Staging environment for all changes

Every change is deployed and tested on a staging environment before reaching production. No direct pushes to main.

Webhook signature verification

All incoming webhooks (Stripe, provisioning) are verified using cryptographic signatures before processing.

Incident response plan

Security incidents will be communicated to affected schools within 72 hours via email. Formal incident response documentation is being finalized.

Real-time error monitoring and alerting

Client-side errors are logged via log-client-error endpoint. Server-side real-time monitoring (Sentry/Datadog) is being configured.

Employee security training program

Planned as the team scales. Current team follows secure development practices as part of daily workflow.

Data & Privacy

FERPA compliance posture

OperateEDU acts as a service provider under FERPA. Schools retain full ownership and control of all data including student PII. Student data is only in the system because the school imported it.

No data selling or advertising use

We never sell, share, or use school data for advertising purposes. Your data exists solely to power your school's operations.

School-scoped data isolation

Every database query is scoped to the authenticated school. Schools cannot access each other's data by design.

Data export capability

Schools can export their data via CSV from reports, audit logs, and dashboards at any time. Your data is never held hostage.

Minimal third-party data processors

Data processing limited to essential services: Supabase (database), Railway (compute), Cloudflare (CDN), Stripe (payments), Google (email/SSO). Full list in our Privacy Policy.

Data Processing Agreement (DPA) template

A standard DPA for schools that require one is being finalized. Contact info@operateedu.com to request one.

Automated data retention and deletion

Planned automated data lifecycle management. Currently, data deletion is handled on request per our privacy policy.

Security questions or concerns?

We take security seriously and welcome questions from prospective and current customers. For security disclosures, contact us directly.

security@operateedu.com General Inquiries

Built secure from day one

Start your free trial and see how OperateEDU protects your school's data.

Start Free Trial