Skip to content

Security

Learn about Futurity’s security features and how to protect your organization’s data.

Futurity is built with security-first principles:

  • Encryption: All data encrypted in transit and at rest
  • Authentication: Industry-standard OAuth and JWT
  • Authorization: Role-based access control (RBAC)
  • Compliance: SOC 2 Type II, GDPR compliant
  • Infrastructure: Hosted on secure cloud infrastructure
Data StateMethod
In transitTLS 1.3
At restAES-256
DatabaseEncrypted volumes
BackupsEncrypted snapshots

Your data is stored in secure data centers. Contact us for specific data residency requirements.

Data TypeRetention
Active contentUntil deleted
Deleted content30 days (recoverable)
Audit logs1 year
Backups30 days

Passwords must meet these criteria:

  • Minimum 12 characters
  • Mix of uppercase and lowercase
  • At least one number
  • At least one special character
  • Not in common password lists

Enterprise plans support SSO with:

  • Google Workspace
  • Microsoft Azure AD
  • Okta
  • SAML 2.0 providers
SettingDefault
Session timeout24 hours
Inactive timeout2 hours
Concurrent sessionsAllowed
Session revocationImmediate

See Roles & Permissions for detailed RBAC configuration.

User → Role → Permissions → Resources
  • You’re assigned roles
  • Roles contain permissions
  • Permissions control resource access

Beyond roles, resources have their own access controls:

  • Vault: File and folder sharing
  • Workflows: Per-workflow permissions
  • Dashboards: Sharing settings
Event TypeExamples
AuthenticationLogin, logout, failed attempts
User managementInvites, role changes, removals
Content accessFile views, downloads, shares
ConfigurationSettings changes, integrations
API accessAPI calls with user context
  1. Go to Organization → Security
  2. Click Audit Logs
  3. Filter by date, user, or event type
  4. Export as needed

Audit logs are retained for:

  • Standard plans: 90 days
  • Professional plans: 1 year
  • Enterprise plans: Custom retention

API requests require authentication:

Terminal window
curl -H "Authorization: Bearer YOUR_TOKEN" \
https://api.futurity.work/v1/endpoint
Token TypeLifetimeUse Case
Access token1 hourAPI requests
Refresh token30 daysGet new access tokens
API keyUntil revokedServer-to-server

To prevent abuse, API requests are rate limited:

PlanRequests/minute
Standard60
Professional300
EnterpriseCustom
  • Hosted on enterprise-grade cloud providers
  • Isolated virtual networks
  • Regular security patches
  • DDoS protection
  • Web Application Firewall (WAF)
  • Intrusion detection systems
  • Regular penetration testing
  • Vulnerability scanning
  • 24/7 infrastructure monitoring
  • Anomaly detection
  • Automated alerts
  • Incident response team
StandardStatus
SOC 2 Type IICertified
GDPRCompliant
ISO 27001In progress
  • Data Processing Agreement (DPA) available
  • Standard Contractual Clauses for international transfers
  • Privacy-by-design principles
  1. Enable SSO: Centralize authentication
  2. Regular access reviews: Audit user permissions quarterly
  3. Offboard promptly: Remove departed users immediately
  4. Monitor audit logs: Review for suspicious activity
  5. Keep contacts updated: Ensure security contacts are current
  1. Strong passwords: Use unique, complex passwords
  2. Don’t share credentials: Use your own account
  3. Log out on shared devices: Don’t stay logged in
  4. Report suspicious activity: Alert admins to anything unusual
  5. Be careful with sharing: Only share with appropriate people
  1. Secure API keys: Never commit to source control
  2. Rotate tokens: Refresh credentials regularly
  3. Validate inputs: Sanitize data sent to APIs
  4. Handle errors properly: Don’t expose sensitive info
  5. Use HTTPS only: Never use unencrypted connections

Found a security vulnerability? Contact us:

If a security incident affects your data:

  1. We’ll notify you within 72 hours
  2. Provide details about impact
  3. Share remediation steps
  4. Conduct post-incident review

Stay informed about security:

  • Check our Changelog for security updates
  • Subscribe to security notifications in Organization settings
  • Review release notes for security patches

For security questions: