Encryption at rest
OAuth tokens and sensitive data encrypted with AES-256-GCM via a derived key (MAIL_TOKEN_ENC_KEY) with zero-downtime hot rotation.
Security isn't an add-on layer — it's built into every line of code, every query, every RLS policy.
OAuth tokens and sensitive data encrypted with AES-256-GCM via a derived key (MAIL_TOKEN_ENC_KEY) with zero-downtime hot rotation.
Postgres Row-Level Security on 100% of user tables. No query can cross organization boundaries, even with an app-layer bug.
Every platform action (impersonation, suspension, admin access) is written to an append-only log chained with SHA-256 — tampering is detectable.
Signable DPA, subprocessor registry, incident notification workflow < 72h, on-demand export and deletion.
Send anomaly detection (bounces, spam) → automatic sending freeze on the affected org + internal Slack alert.
Managed Postgres, Edge runtime on Cloudflare Workers, 7-day PITR backups, 99.9% uptime monitoring.
Vulnerability disclosure? security@helixmail.com (PGP available).