Security & Compliance
Enterprise-grade security built for the most demanding compliance requirements. Pass audits with confidence.
Architecture
All API credentials are encrypted using AES-256-GCM before storage. Each tenant has a unique encryption key derived from a master key using HKDF. Even in the unlikely event of database compromise, credentials remain protected.
All API communication uses TLS 1.3 with perfect forward secrecy. Credentials are never transmitted in plaintext. Automatic certificate rotation and HSTS enforcement prevent downgrade attacks.
Every request is authenticated and authorized independently. No implicit trust based on network location. IP allowlisting, client identification, and route-level access controls ensure only authorized requests succeed.
// Every request requires multi-layer authentication const request = { headers: { 'X-KnoxCall-API-Key': 'kc_...', // API key auth 'X-KnoxCall-Client-ID': 'device-123', // Client tracking 'X-KnoxCall-Route': 'stripe-charge' // Route authorization } }; // Automatic checks before proxying: // 1. API key valid & not revoked // 2. Client IP in allowlist (if configured) // 3. Route exists & tenant has access // 4. Rate limits not exceeded // 5. Request signing validated (if enabled)
Every API request, credential access, and configuration change is logged with cryptographic integrity protection. Logs are append-only and retained for compliance requirements (30-365 days configurable).
Compliance
Here's what KnoxCall automatically handles for your compliance requirements:
AES-256-GCM encryption with HSM-backed keys and automatic rotation. Meets or exceeds all major compliance standards for data encryption.
Role-based access control (RBAC), IP allowlisting, and client-level restrictions. Audit trail shows who accessed what and when.
Comprehensive logging of all API calls, configuration changes, and credential access. Tamper-evident logs with configurable retention (30-365 days).
Multi-region deployment with data residency guarantees. EU customers can ensure data never leaves European servers.
Real-time alerts for suspicious activity, rate limit violations, and authentication failures. Multi-channel notifications (Email, SMS, Slack).
Customers can delete all data on demand via API or dashboard. Cryptographic erasure ensures data cannot be recovered.
Annual third-party penetration testing by certified security firms. Vulnerability scanning and remediation tracking included.
BAA available for healthcare customers. De-identified logging and encrypted PHI handling compliance guaranteed.
Additional
OAuth2 tokens are automatically refreshed 5 minutes before expiration. Refresh tokens are encrypted and stored separately from access tokens. Supports Google, Microsoft, Salesforce, and custom OAuth2 providers.
Configurable rate limits per route, per client, or globally. Automatic DDoS mitigation with challenge-response for suspicious traffic patterns. Cloudflare integration for additional protection.
HMAC-SHA256 request signing prevents tampering and replay attacks. Configurable signature headers and nonce validation ensure requests are fresh and authentic.
Start securing your APIs with enterprise-grade compliance. SOC 2, PCI-DSS, HIPAA, and GDPR coverage included.