Legal Last Updated: June 2025

Enterprise Security Compliance

FaceAccess is built for enterprise-grade security from the ground up. This page documents our security architecture, compliance posture, and controls protecting your data and biometric information.

๐Ÿ”’ Security Status

Edge Infrastructure: Cloudflare global network with DDoS protection & WAF  ยท  Data Encryption: AES-256 at rest, TLS 1.2+ in transit  ยท  Biometric Templates: Encrypted, never stored as raw images

1. Infrastructure Security

๐ŸŒ

Cloudflare Edge Network

All FaceAccess services are deployed on Cloudflare's global edge network (Cloudflare Pages & Workers). This provides automatic DDoS protection, global content delivery, and Web Application Firewall (WAF) protection. Traffic is filtered at the edge before reaching application logic.

๐Ÿ”

Encryption at Rest and In Transit

All data at rest including biometric embeddings, user credentials (bcrypt-hashed passwords), and access logs are stored encrypted. All data in transit uses TLS 1.2 or higher. Sensitive configuration values (API keys, secrets) are stored as Cloudflare encrypted secrets and never exposed in application code.

๐Ÿ›ก๏ธ

Serverless Security Model

FaceAccess runs on a serverless edge architecture with no persistent server processes that could be compromised. Each request is handled in an isolated Cloudflare Worker environment. There is no SSH access, no persistent root processes, and no long-running server to maintain.

๐Ÿ—„๏ธ

Cloudflare D1 Database

All persistent data including user records, access event logs, and biometric templates are stored in Cloudflare D1 (distributed SQLite). The database is isolated to the FaceAccess application namespace, access-controlled by Cloudflare's platform security, and backed up with point-in-time recovery.

2. Authentication and Access Control

User Authentication

Rate Limiting and Abuse Prevention

Admin Access Controls

3. Biometric Data Security

4. Application Security Controls

Input Validation
All API inputs are validated and sanitized. Maximum field lengths enforced. SQL injection prevention via parameterized queries only.
XSS Protection
All user-generated content is HTML-escaped before rendering. Content Security Policy headers applied at the edge.
CORS Policy
Cross-Origin Resource Sharing is restricted to approved origins. API endpoints enforce proper CORS headers.
Secret Management
API keys and credentials stored as Cloudflare encrypted secrets. No secrets in source code or version control.
Dependency Management
Minimal dependency footprint. Dependencies reviewed for known vulnerabilities. Build artifacts audited before deployment.
Error Handling
Production error responses never expose internal stack traces, database schema, or system configuration details.
Audit Logging
All authentication events, access decisions, admin actions, and enrollment events are logged with timestamp, IP, and user agent.
Anti-Spoofing
Multi-frame liveness detection rejects printed photos, phone screens, and 3D masks with anti-spoof threshold of 0.72/1.0.

5. Compliance Framework Alignment

FaceAccess is designed to align with the following frameworks and regulations:

6. Incident Response

In the event of a security incident involving personal or biometric data:

To report a security vulnerability: support@faceaccess.com with subject "Security Vulnerability Report".

7. Data Residency and Processing

FaceAccess data is processed and stored within Cloudflare's global infrastructure. Cloudflare operates data centers in the United States and internationally. Users in the European Union should note that data may be transferred to the United States. FaceAccess relies on Cloudflare's Data Processing Agreements and Standard Contractual Clauses for international data transfers.

8. Vendor Security

FaceAccess evaluates third-party vendors for security posture before integration. Current approved vendors:

Vendor access to FaceAccess data is limited to what is strictly necessary for service delivery and governed by Data Processing Agreements.

9. Business Continuity

FaceAccess is built on Cloudflare's globally distributed infrastructure providing high availability and automatic failover. Cloudflare's 99.99% uptime SLA covers the underlying edge network. Application-level redundancy is provided through Cloudflare Pages and Workers distributed architecture.

10. Security Inquiries

Enterprise customers may request a Security Questionnaire response, Sub-Processor list, or Data Processing Agreement by contacting:
support@faceaccess.com