Security & Trust — Enterprise Grade

Enterprise-Grade Security for Sensitive Humanitarian Data

KafalaBridge is built with institution-grade security from the ground up — protecting children, sponsors, and organizations at every layer.

Row Level Security
AES-256 Encryption
Stripe PCI DSS L1
GDPR Ready
Full Audit Logs
99.9% Uptime SLA
AES-256
Encryption Standard
TLS 1.3
Data In Transit
99.9%
Uptime SLA
PCI L1
Payment Compliance
Security Layer 01

Data Isolation

Database-level separation — not just application-level

Each institution's data is completely separated using Supabase Row Level Security (RLS). No organization can ever read, write, or access another institution's records — enforced at the database layer.

RLS policies are evaluated for every single query — even if application code has a bug, the database enforces the boundary.

Al Noor Foundation
Isolated
Mercy Relief Int'l
Isolated
Human Aid Europe
Isolated
RLS enforced at database level
Security Layer 02

Role-Based Access Control

Five distinct permission levels — no over-provisioning

Five permission tiers: super_admin, org_admin, staff, sponsor, and guardian. Every user sees exactly the data their role requires — nothing more.

Role assignments are audited. Promotions and demotions require org_admin approval and are logged with timestamp.

super_admin
All accessBillingOrg mgmt
org_admin
ProfilesReportsTeam
staff
ProfilesMessages
+ sponsor & guardian roles — read-only
Security Layer 03

Encrypted Data & Storage

AES-256 at rest. TLS 1.3 in transit. Always.

All data is encrypted at rest using AES-256-GCM and in transit using TLS 1.3. Documents and files are stored in private, access-controlled storage buckets — never publicly accessible.

Encryption keys are managed independently from data — a compromised database cannot be decrypted without the key.

Data at rest
AES-256-GCM
Data in transit
TLS 1.3
Document buckets
Private, signed URLs
Passwords
bcrypt + salted
Security Layer 04

Payment Security

Stripe PCI DSS Level 1 — zero card data stored

Payments are processed exclusively through Stripe — PCI DSS Level 1 compliant. KafalaBridge never receives, stores, or logs cardholder data of any kind.

Failed payments trigger automatic retry logic with sponsor notifications — no manual intervention required.

Stripe Checkout
PCI L1

Card data never touches KafalaBridge servers

Stripe handles all cardholder data
Security Layer 05

Child Data Protection

Safeguarding built into the architecture — not bolted on

Sensitive child information is protected by strict field-level access policies. Photos and documents are accessible only to authorized org members and the explicitly assigned sponsor.

Designed for compliance with international child safeguarding standards. Suitable for UNICEF, Save the Children, and similar framework requirements.

Child Record #A-1042Pseudonymized
Full name
org_admin only
Photo
Assigned sponsor only
Documents
staff + org_admin
Status
All authorized roles
Child safeguarding by design
Security Layer 06

Audit Logs

Every action. Every actor. Every timestamp.

Every meaningful action in the platform — profile updates, document downloads, login events, role changes, payment completions — is logged with actor identity, timestamp, IP address, and device fingerprint.

Audit logs are append-only and cannot be deleted by any role — including super_admin.

Profile status updated
staff@alnoor.org
09:14 AM
Document downloaded
admin@kafalaid.com
09:08 AM
Sponsor assigned
system
08:55 AM
Login from new IP
org@mercy.org
08:41 AM
Security Layer 07

Backup & Recovery

99.9% uptime SLA with daily automated backups

Automated daily, weekly, and monthly backups with point-in-time recovery up to 30 days. Disaster recovery protocols tested quarterly.

Recovery time objective (RTO) under 4 hours. Recovery point objective (RPO) under 24 hours for all plans.

Daily
Backup
Weekly
Backup
Monthly
Backup
Uptime — last 30 days99.97%
Point-in-time recovery up to 30 days
Security Layer 08

GDPR & Compliance

Privacy-by-default. Data residency options available.

Designed with GDPR principles at the core. Right to access, right to deletion, data minimization, and privacy by default are supported natively.

KafalaBridge maintains a Record of Processing Activities (ROPA). Suitable for EU and international organizations.

Right to access
Export full data on request
Right to deletion
Full wipe within 72 hours
Data residency
EU and regional options
Privacy by default
Minimum data by design
Processing records
ROPA documentation
Permission Matrix — All 5 Roles

Exactly the right access. Nothing more.

Every role in KafalaBridge has a precisely defined permission scope — enforced at both the API and database levels simultaneously.

super_admin
org_admin
staff
sponsor
guardian
Permissionsuper_adminorg_adminstaffsponsorguardian
Profiles
View orphan profiles
Create / edit profiles
View child full name & photo
View assigned child (sponsor)
Sponsorships
Assign sponsors
View own sponsorship
Manage subscriptions
Communications
Send messages
Moderate messages
View all conversations
Reports & Admin
Export PDF/Excel reports
Manage team members
Access audit logs
Billing & subscription
Compliance & Certifications

Built to meet the standards your institution requires

KafalaBridge's infrastructure is aligned with international data protection, payment security, and operational standards.

GDPR

EU General Data Protection Regulation

Compliant
PCI DSS

Level 1 via Stripe

Certified
TLS 1.3

Transport layer encryption

Enforced
AES-256

Data at rest encryption

Active
SOC 2

Security & availability (roadmap)

In Progress
RLS

Row Level Security enforced

Active

SOC 2 Type II certification is on our 2025 roadmap. Detailed security documentation available upon request for enterprise procurement teams.

Security Questions?

Have security or compliance questions? Talk to our team.

Our team can provide detailed security documentation, architecture diagrams, and compliance evidence packages for enterprise procurement processes.

Security Documentation

Full architecture diagrams, threat models, and data flow documentation for your IT and legal teams.

Compliance Evidence Package

GDPR Data Processing Agreement (DPA), PCI compliance documentation, and audit log samples.

Security Briefing Call

30-minute call with our CTO or security lead — walk through our architecture and ask any question.

Procurement Support

We respond to security questionnaires, RFPs, and vendor assessment forms for enterprise clients.