Security Documentation
Last Updated: May 2025
HouseMunny is committed to maintaining the highest standards of security and data protection. This document outlines our comprehensive security controls and policies.
1. Data Encryption Practices
✅ IMPLEMENTED
- Data in Transit: All communications use TLS 1.2+ encryption
- Data at Rest: AES-256-GCM encryption for all sensitive data
- Field-Level Encryption: Personal data, financial information, and API tokens are encrypted at the database level
- Key Management: Encryption keys are securely managed through environment variables
2. Vulnerability Scanning
✅ IMPLEMENTED
- Automated Scanning: GitHub Dependabot monitors dependencies for vulnerabilities
- Regular Audits: Monthly dependency audits using yarn audit
- Current Status: No critical vulnerabilities detected
- SLA: Critical vulnerabilities patched within 7 days, moderate within 30 days
3. Zero Trust Architecture
✅ IMPLEMENTED
- Authentication Required: All application routes require authentication
- No Hardcoded Secrets: All sensitive data stored in environment variables
- Database Isolation: Database access restricted to application backend only
- API Security: Internal APIs protected with bearer token authentication
4. Centralized Identity & Access Management
✅ IMPLEMENTED
- Single Sign-On: Google OAuth integration for user authentication
- Password Management: Secure password storage using Firebase Authentication
- Access Control: Role-based access through centralized user management
- Session Management: JWT-based sessions with 30-day expiration
5. Secure Tokens and Certificates
✅ IMPLEMENTED
- OAuth Implementation: Secure OAuth 2.0 flow with Google
- API Token Security: Plaid access tokens encrypted at rest
- SSL Certificates: Production database connections use client certificates
- Two-Factor Authentication: Optional TOTP-based 2FA available for users who choose to enable it
6. Vulnerability Patching SLA
✅ DEFINED
- Critical Vulnerabilities: Patched within 7 days
- High Vulnerabilities: Patched within 14 days
- Medium Vulnerabilities: Patched within 30 days
- Low Vulnerabilities: Patched within 90 days
7. End-of-Life Software Monitoring
✅ IMPLEMENTED
- Quarterly Reviews: All dependencies and software versions reviewed quarterly
- Automated Monitoring: GitHub Dependabot alerts for outdated packages
- Upgrade Policy: EOL software upgraded within 30 days of identification
- Current Status: All major dependencies are actively maintained
8. Information Security Policy
✅ ESTABLISHED
- Data Classification: Financial data classified as highly sensitive
- Encryption Standards: AES-256 encryption for all sensitive data
- Access Controls: Principle of least privilege enforced
- Backup Policy: Automated daily backups with encryption
- Retention Policy: Data retained per legal requirements and user consent
9. Access Control Policy
✅ IMPLEMENTED
- User Authentication: Multi-factor authentication available (TOTP-based 2FA optional)
- Administrative Access: Limited admin roles for currency rate management only
- API Access: Bearer token authentication for all internal APIs
- Database Access: Restricted to application layer only
- Secret Management: All secrets stored in secure environment variables
10. Role-Based Access Control (RBAC)
✅ IMPLEMENTED
- User Roles: Standard users, admin users with distinct permissions
- Data Isolation: Users can only access their own financial data
- Administrative Functions: Restricted to admin role holders
- API Permissions: Role-based API access controls implemented
11. Periodic Access Reviews
✅ SCHEDULED
- Quarterly Reviews: All user access and permissions reviewed quarterly
- Administrative Access: Admin access reviewed monthly
- Service Accounts: API keys and service accounts audited quarterly
- Documentation: All access reviews documented and tracked
12. Automated Access Deprovisioning
✅ IMPLEMENTED
- User Account Deletion: Automated process for user-requested account deletion
- Session Management: Automatic session expiration and cleanup
- Access Revocation: Immediate access revocation upon role termination
- Data Cleanup: Secure data deletion following retention policies
13. AI Usage and Data Protection
✅ IMPLEMENTED
- Limited AI Integration: OpenAI's API used solely for categorizing Plaid-imported transactions
- Scope Limitation: AI processing only applies to bank-imported transactions, not manually added ones
- Data Minimization: Only non-sensitive text data (transaction labels) sent to AI service
- No Personal Data Sharing: No personal information, financial amounts, or identifiable data transmitted
- User Control: Users can review and modify any AI-assigned categorization at any time
- No Profiling: AI is not used for user profiling or automated decision-making with legal effects
- Transparency: All AI categorizations are clearly visible and editable by users
Contact Us
If you have any questions about this Security Documentation or our security practices, please contact us at: guilherme@housemunny.com