Infrastructure Security
- ✓EU-only hosting: All servers and data storage remain within the European Union. No cross-border data transfers to the US or other regions.
- ✓Encryption at rest: Database and object storage use AES-256 encryption with regular key rotation.
- ✓Encryption in transit: All API endpoints enforce TLS 1.2+ with modern cipher suites.
- ✓Network isolation: PDF rendering workers run in isolated containers with restricted network access.
Access Controls
- ✓API key authentication: All requests require a valid API key with bearer token authentication.
- ✓Rate limiting: Automatic rate limits prevent abuse and ensure fair resource allocation.
- ✓SSRF protection: Input validation prevents Server-Side Request Forgery attacks. External resource fetching is restricted.
- ✓Principle of least privilege: Services run with minimal required permissions.
Input Validation & Processing
- ✓Payload size limits: HTML input limited to 500 KB to prevent resource exhaustion.
- ✓Schema validation: All API requests are validated against strict schemas with FluentValidation.
- ✓Sandboxed rendering: PDF generation happens in isolated processes with resource limits.
Monitoring & Incident Response
- ✓Structured logging: All requests logged with unique request IDs for traceability and audit trails.
- ✓Automated monitoring: Real-time alerting for anomalous traffic patterns and service health.
- ✓Incident response: Defined procedures for security incidents with notification protocols for affected customers.
- ✓Regular updates: Dependencies and system packages are regularly updated to address known vulnerabilities.
Data Retention & Deletion
- ✓Configurable retention: Control how long generated PDFs are stored. Default is 24 hours, configurable up to 30 days.
- ✓No-store option: PDFs can be streamed directly without any storage on our infrastructure.
- ✓Automatic deletion: Expired PDFs are automatically purged from storage systems.
