Skip to content

Security

CLARITY is designed with security as a core principle. This guide covers the security measures built into the platform and recommendations for production environments.

Credential Encryption

All cloud provider credentials (AWS access keys, Azure service principal secrets, GCP service account keys) are encrypted at rest using AES-256 encryption. Credentials are:

  • Encrypted before storage in the database
  • Decrypted only in memory when needed for API calls
  • Never logged, cached in plaintext, or exposed in API responses
  • Never transmitted to third parties

Session Management

CLARITY uses server-side session management:

  • Sessions are stored server-side (not in browser cookies)
  • Session tokens are cryptographically random
  • Sessions expire automatically after a configurable inactivity period
  • Logging out immediately invalidates the session
  • Each user's data is isolated by session — no cross-account data leakage

Role-Based Access Control

Every API operation enforces role-based permissions:

  • All endpoints require authentication
  • Each endpoint checks the user's role before executing
  • Unauthorized requests return an error without leaking data
  • Role checks happen server-side and cannot be bypassed by the client

See Roles & Permissions for the full permission matrix.

Audit Logging

CLARITY maintains a comprehensive audit log of all significant actions:

Audit Log

CategoryTracked Events
AuthenticationLogin attempts (success and failure), logouts
Account ManagementCredential additions, updates, deletions
Data OperationsSync triggers, report generation
User ManagementUser creation, role changes, deactivation
System EventsConfiguration changes, scheduled operations

Audit logs include timestamps, the acting user, the action performed, and relevant context. Logs are viewable by all authenticated users and cannot be modified or deleted.

Optional Security Integrations

Cloudflare Access (SSO)

CLARITY can be placed behind Cloudflare Access to add identity-provider-based authentication:

  • Enforce login via your corporate identity provider (Okta, Azure AD, Google Workspace, etc.)
  • Add a second authentication layer before users reach CLARITY
  • Manage access policies centrally through Cloudflare's dashboard

Cloudflare Turnstile (CAPTCHA)

Enable Cloudflare Turnstile on the login page to protect against automated login attempts and credential stuffing.

Network Security Recommendations

For production deployments, we recommend:

  • Run behind a VPN or Cloudflare Access — Do not expose CLARITY directly to the public internet
  • Restrict port access — Only the web interface port needs to be accessible to users
  • Use HTTPS — Terminate TLS at your reverse proxy or load balancer
  • Isolate the database — Ensure the database is not accessible from outside the application network
  • Rotate credentials regularly — Periodically rotate cloud provider credentials stored in CLARITY

WARNING

Never expose database or internal service ports to the public internet. Only the CLARITY web interface should be reachable by end users.

Next Steps

Multi-Cloud FinOps Platform