Security Overview
The MRI integration implements enterprise-grade security measures to protect your data throughout the synchronisation process.All security measures comply with UK GDPR, the Data Protection Act 2018, and RICS best practices.
Credential Security
Vault Encryption
API credentials are encrypted at rest using Supabase Vault:- Encryption: AES-256-GCM
- Key Management: Automatic key rotation
- Access: Row-level security policies
Credential Rotation
The system tracks credential age and alerts directors when rotation is due:| Age | Status | Action |
|---|---|---|
| 0-60 days | 🟢 Current | No action needed |
| 60-90 days | 🟡 Due Soon | Plan rotation |
| 90+ days | 🔴 Overdue | Rotate immediately |
Data Protection
Data in Transit
- All API calls use TLS 1.3 encryption
- Certificate pinning for the MRI MIX API
- No sensitive data in URL parameters
Data at Rest
- Database encrypted with AES-256
- Backups encrypted with separate keys
- Point-in-time recovery enabled
Data Minimisation
Only essential data is synchronised:Synced Data
Synced Data
- Property and unit details
- Tenancy information
- Financial transactions
- Contact business details
- Maintenance records
- Compliance documents
Not Synced
Not Synced
- Personal bank account numbers
- National Insurance numbers
- Passport/ID copies
- Medical information
- Criminal records
Access Control
Role-Based Access
Only authorised users can configure or access MRI integration:| Role | Permissions |
|---|---|
| Building Director | Full access to configuration and data |
| Property Manager | View sync status, trigger manual syncs |
| Homeowner | View own synced data only |
| Super Admin | Full access across all buildings |
Row-Level Security
Supabase RLS policies ensure users only access their authorised buildings:Audit Logging
What’s Logged
All integration activities are logged for compliance and security monitoring: Security Events:- ✅ Credential storage and updates
- ✅ Credential access (every retrieval is logged)
- ✅ Credential rotation events
- ✅ API authentication attempts (success and failure)
- ✅ Failed authentication attempts with IP addresses
- ✅ Sync operations (start, complete, errors)
- ✅ All API calls (endpoint, method, HTTP status)
- ✅ Data modifications from sync
- ✅ Configuration changes
- ✅ Manual overrides and conflict resolutions
- ✅ Rate limit violations
Log Entry Details
Each audit log entry includes:Log Retention
| Log Type | Retention | Purpose |
|---|---|---|
| Sync logs | 90 days | Operational troubleshooting |
| Audit logs | 7 years | Compliance and legal requirements |
| Error logs | 1 year | System reliability monitoring |
| Security logs | 7 years | Security incident investigation |
Accessing Audit Logs
Building directors can view audit logs in the MRI Integration settings:- Navigate to Settings → Integrations → MRI
- Click the Security tab
- View the Audit Log section
Compliance
GDPR Compliance
Data processing agreement with MRI Software
Data processing on customer’s MRI server infrastructure
Data subject access request support
Right to erasure implementation
Data Processing Agreement
MRI data is processed on the customer’s own MRI server (on-premise or hosted). We have:- DPA in place with MRI Software
- Data location depends on customer’s MRI deployment
- Data breach notification procedures agreed
Security Checklist
Weekly
- Review sync error logs
- Check for failed authentications
Monthly
- Audit user access permissions
- Review credential access logs
- Check sync performance metrics
Quarterly
- Rotate MRI credentials
- Security assessment
- Review DPA with MRI
Technical Security Details
Defense in Depth
The MRI integration implements multiple security layers:| Layer | Implementation | Purpose |
|---|---|---|
| Application | HTTP Basic Auth over HTTPS | Secure API access |
| Transport | TLS 1.3 encryption | Protect data in transit |
| Storage | AES-256-GCM encryption | Protect credentials at rest |
| Database | Row Level Security (RLS) | Enforce access control |
| Audit | Comprehensive logging | Detect security incidents |
| Network | Rate limiting & timeouts | Prevent abuse |
Credential Security Architecture
Key Security Features:- Never in Plain Text - All credentials are encrypted before storage
- Vault-Only Storage - Secrets stored in Supabase Vault, not regular database columns
- Access Logging - Every credential retrieval is logged with user ID, IP, and timestamp
- Building Scoped - Each building has separate credentials (no cross-contamination)
- RLS Enforcement - Database policies prevent unauthorized access
HTTP Basic Auth Security
Credential Lifecycle:- Storage - All MIX API credentials (Client ID, Database Name, User Name, Partner Key, Password) encrypted in Supabase Vault with AES-256-GCM
- Retrieval - Credentials decrypted server-side only when needed for API calls
- Usage - Base64-encoded credentials included in Authorization header over HTTPS
- Isolation - Each building has separate credentials (no cross-contamination)
- Rotation - Credentials can be rotated independently per building
- ✅ Credentials never exposed to frontend/browser
- ✅ All API calls over TLS 1.3 only
- ✅ No credential storage in localStorage or cookies
- ✅ Every credential access logged with user ID and IP
- ✅ Supabase Vault automatic key rotation
Data Encryption
At Rest:- Database: AES-256 encryption
- Vault secrets: AES-256-GCM with automatic key rotation
- Backups: Encrypted with separate keys
- Point-in-time recovery: Encrypted snapshots
- TLS 1.3 for all API communications
- Certificate pinning for MRI MIX API
- No sensitive data in URL parameters
- Bearer tokens in headers only
Row Level Security (RLS) Policies
The integration enforces strict access control at the database level:- ✅ Enforced at database level (can’t be bypassed)
- ✅ Automatic filtering of unauthorized data
- ✅ Protection against SQL injection
- ✅ Multi-tenant data isolation
Incident Response
Immediate Actions
If you suspect a security issue:Contact Security Team
Email security@manage.management with details of the incident
Investigation Queries
Building directors can run these queries to investigate suspicious activity: Check recent credential access:Breach Notification
In the event of a data breach:- 72-hour notification to ICO (UK GDPR requirement)
- Immediate notification to affected building directors
- Incident report provided within 7 days
- Remediation plan implemented immediately
Security Best Practices
For Building Directors
Rotate MRI credentials every 90 days
Review audit logs monthly
Use strong, unique passwords for MRI account
Enable two-factor authentication on your Manage.Management account
Only share credentials with authorized directors
Immediately revoke access for departed directors
For Property Managers
Maintain separate credentials for each building
Document credential rotation procedures
Train staff on security best practices
Monitor sync error logs for anomalies
Conduct quarterly security reviews
Compliance Certifications
Current Compliance
SOC 2 Type II
Supabase infrastructure is SOC 2 Type II certified
UK GDPR
Full compliance with UK data protection regulations
ISO 27001
Information security management system certified
EU-UK Data Transfer
Standard Contractual Clauses in place for international transfers
Data Processing Agreement
Our DPA with MRI Software includes:- ✅ Purpose limitation and data minimization
- ✅ Security measures and encryption requirements
- ✅ Sub-processor agreements
- ✅ Data breach notification procedures (72 hours)
- ✅ Data subject rights support (access, erasure, portability)
- ✅ Audit rights and compliance monitoring