Security

Last updated: April 2026

Tenant isolation

Every MSPbrief account lives under a tenant ID. Isolation is enforced at the database level via PostgreSQL row-level security policies — clients, schedules, integration credentials, and report history are not visible or reachable across tenants.

Credentials at rest

Integration credentials (ConnectWise keys, NinjaRMM OAuth secrets, SmileBack passwords, etc.) are encrypted at rest with AES-256-GCM using a per-deployment encryption key. Plaintext credentials are never written to logs and are decrypted only at report-generation time inside our server. They are never sent back to the browser after they are saved.

In-transit

All connections to MSPbrief are TLS 1.2+. All third-party API calls (ConnectWise, Ninja, SmileBack, Anthropic, SMTP2GO) use HTTPS.

Authentication

Authentication is provided by Supabase Auth (email + password). Sessions are signed, short-lived, and refreshed via secure HTTP-only cookies. Password hashing is handled by Supabase using industry-standard algorithms.

Reporting a security issue

Found something? Email security@mspbrief.io. We'll respond within one business day.
Placeholder page. This describes how MSPbrief is built today, not a formal security commitment. SOC 2 / ISO 27001 attestations are not yet in place. Replace this content with reviewed copy and remove this notice before public launch.