Security

Security overview for Tijara operational controls.

Security

Effective Date: March 2026 Last Updated: March 2026

At SoneaLabs, we understand that import-export businesses entrust us with sensitive trade and financial data. Security is embedded into every layer of the Tijara platform. This document describes the technical controls, organizational practices, and infrastructure decisions that protect your data.

SoneaLabs is an independently operated brand based in Mumbai, India, building and operating the Tijara platform.


1. Infrastructure and Hosting

1.1 Cloud Architecture

Tijara is built on a modern cloud-native architecture:

ComponentProviderPurpose
DatabaseSupabase (PostgreSQL on AWS)Primary data store, authentication, file storage
ApplicationVercelApplication hosting, edge delivery, serverless functions
CDNVercel Edge NetworkGlobal content delivery with automatic SSL
DNSVercel / CloudflareDNS resolution and DDoS protection

1.2 Data Residency

Your data is stored in Supabase-managed PostgreSQL databases hosted on Amazon Web Services (AWS) infrastructure. Database backups are maintained by Supabase within the same cloud region.

1.3 Infrastructure Security Inheritance

We inherit security controls from our infrastructure providers:


2. Data Encryption

2.1 Encryption in Transit

All data transmitted between your browser and the Tijara platform is encrypted using TLS 1.2 or higher. This applies to:

We enforce HTTP Strict Transport Security (HSTS) headers to prevent protocol downgrade attacks.

2.2 Encryption at Rest

2.3 Application-Level Encryption

Sensitive financial data receives an additional layer of application-level encryption beyond the infrastructure encryption:


3. Authentication and Access Control

3.1 User Authentication

3.2 Row-Level Security (RLS)

All database tables are protected by PostgreSQL Row-Level Security policies. This means:

3.3 Role-Based Access Control (RBAC)

Within each organization, access is controlled by roles:

RoleCapabilities
OwnerFull access. Manage billing, invite/remove users, delete organization.
AdminCreate, edit, and delete all records. Invite users. Cannot manage billing or delete org.
MemberCreate and edit records. Cannot delete records or manage users.
ViewerRead-only access. Cannot create, edit, or delete any records.

Role assignments are enforced at the API level — every write operation checks the user's role and plan entitlements before proceeding.

3.4 Write-Policy Controls

On the Business plan, granular write-policy controls are available, allowing organization owners to configure which roles can perform specific write operations. This is enforced via the requireWriteActorPolicy check on all mutating API routes.


4. Application Security

4.1 API Security

4.2 SQL Injection Prevention

4.3 Cross-Site Scripting (XSS) Prevention

4.4 Cross-Site Request Forgery (CSRF) Protection

4.5 Dependency Security


5. Data Isolation

5.1 Multi-Tenancy Model

Tijara uses a shared-database, shared-schema multi-tenancy model with organization-level data isolation:

5.2 Document Storage Isolation


6. Operational Security

6.1 Audit Logging

6.2 Automated Monitoring

6.3 Backup and Recovery

6.4 Incident Response

In the event of a security incident:

  1. Detection and containment: We will immediately investigate and take steps to contain the incident, including revoking compromised credentials and isolating affected systems.
  2. Assessment: We will assess the scope and severity of the incident, including what data may have been affected.
  3. Notification: If the incident involves unauthorized access to personal data, we will notify affected users and relevant authorities as required by applicable laws, including the Information Technology Act, 2000 (India) and, where applicable, the UAE PDPL, within the legally mandated timeframe.
  4. Remediation: We will implement corrective measures to prevent recurrence and document the incident for internal review.
  5. Communication: We will provide affected users with clear information about what happened, what data was affected, and what steps they should take.

To report a security concern, contact us at harsh@sonealabs.com with the subject line "Security Report."


7. Payment Security

Tijara does not collect, store, or process payment card details. All payment processing is handled by Lemon Squeezy, our third-party billing provider, which:


8. Third-Party Security

We carefully evaluate the security posture of all third-party services integrated with the Platform:

ProviderCertificationsData Access
SupabaseSOC 2 Type IIFull database and storage access (as hosting provider)
VercelSOC 2 Type IIApplication code, request metadata
Lemon SqueezyPCI DSS (via Stripe)Billing data only
PostHogSOC 2 Type IIAnalytics events, anonymizable IPs
Google AnalyticsISO 27001Page view data, anonymized IPs
ResendSOC 2 Type IIEmail addresses, email content
WhatsApp Business APIMeta's security frameworkPhone numbers, message content

9. Operational Practices


10. Compliance

10.1 Regulatory Awareness

The Tijara platform is designed with consideration for:

10.2 VAT and Financial Data

The Platform generates invoices and financial reports. These are operational tools and do not constitute official tax documents unless configured with valid Tax Registration Numbers (TRNs). Users are responsible for ensuring their invoices and financial records comply with local tax regulations, including UAE VAT requirements and Indian GST requirements as applicable.


11. Your Security Responsibilities

While we implement extensive security controls, security is a shared responsibility. We recommend:


12. Security Updates

We regularly update the Platform's dependencies, infrastructure, and security controls. Security patches for critical vulnerabilities are deployed as expeditiously as possible. We do not disclose specific vulnerability details publicly until they have been remediated.


13. Contact

For security questions, vulnerability reports, or concerns:

SoneaLabs Operated from Mumbai, Maharashtra, India Email: harsh@sonealabs.com (subject line: "Security") Website: usetijara.com

We aim to acknowledge security reports within 48 hours and provide a substantive response within 5 business days.