Enterprise Security

Your vessel data is
treated like a ship in port — with the highest care

Fleet operators, P&I clubs, and charterers trust CanalClear to handle sensitive filing data. Here's exactly what that means in practice.

TLS 1.2+ in transit
AES-256-GCM at rest
Automated daily backups
Subscription-gated access
GDPR-aware data handling
RBAC + 6-state approval workflow
SOC 2 in progress (Q3 2026)

Encryption at every layer

All data is encrypted both in transit and at rest. No exceptions, no exceptions, no environment shortcuts.

Encryption at Rest

All data stored in our managed PostgreSQL database (Neon) uses AES-256-GCM encryption. Database credentials, tokens, and sensitive metadata are never stored in plain text.

AES-256-GCM — same standard used by banks and government agencies

Encryption in Transit

Every connection to CanalClear requires TLS 1.2 or higher. We enforce HTTPS across the entire site — no HTTP fallback, no mixed content.

TLS 1.2+ enforced — downgrade attacks blocked

Secure Cloud Hosting

Our application runs on Render — a SOC 2 Type II compliant cloud platform. Infrastructure is fully managed, with automatic security patches applied by the provider.

Render.com — SOC 2 Type II certified infrastructure

Real-time Monitoring

Application logs and error rates are monitored continuously. Anomalies trigger alerts before they become incidents. We receive automated notifications if any service degrades.

Uptime and error rate dashboards active 24/7

We store what we need,
no more

Vessel filing data is sensitive. We capture only what's required for compliance validation, and we keep it only as long as you need it.

What We Store

We store vessel particulars, filing status, compliance scores, and submission history — the minimum required to provide compliance automation. We do not store cargo manifests beyond what is needed for canal-specific filing forms.

Retention Policy

Active filing data is retained for as long as your account is active. Deleted accounts have their filing data purged within 30 days. Soft-deleted filings are removed within 90 days.

No Third-Party Data Sharing

We do not sell, share, or transfer your vessel or filing data to any third party — ever. Your data is used exclusively to provide the CanalClear service. Stripe handles payment data separately under Stripe's own privacy policy.

Waterway-gated access by subscription

Every user's access to canal filing modules is enforced by their subscription tier — not just the UI, but the API layer itself.

Enforcement Architecture

Access control is enforced at two layers: the API gateway (subscription-gated route mounts) and the individual filing engine validators. A user without a Suez Canal subscription cannot hit Suez filing endpoints — the routes don't mount for them.

Account Isolation

Each account operates in an isolated data context. Cross-account access is architecturally impossible — your filing data is never accessible to other users.

Encrypted Credentials

Third-party credentials (Suez Canal SCA login) are stored with AES-256-GCM encryption and are only decryptable by the application at runtime — never exposed in logs or responses.

Password Security

User passwords are hashed with bcrypt (cost factor 12). We enforce minimum password requirements and support secure password reset via time-limited tokens.

Waterway access scoped to role

Enterprise ops desks need fine-grained control. CanalClear enforces role boundaries at the API layer — not just the UI.

Four Roles, Four Permission Levels

Each user is assigned exactly one role. Roles control what canals they can access, what filings they can create, and what they can approve.

6-State Approval Workflow

Every filing moves through a defined lifecycle. State transitions are logged immutably — no overwriting, no data loss.

Built on established cloud infrastructure

We don't reinvent infrastructure security — we rely on providers whose entire business is staying ahead of threats.

Application Hosting — Render

CanalClear runs on Render, which provides SOC 2 Type II certified hosting with automatic TLS, DDoS protection, and managed SSL certificates. Services are deployed via CI/CD pipelines — no manual server access.

Render.com — SOC 2 Type II certified

Database — Neon PostgreSQL

The operational database is Neon, a fully managed PostgreSQL platform with automatic branching, point-in-time recovery, and row-level security. Database is hosted in AWS us-east-1 with automatic daily backups.

Neon PostgreSQL — automated branching and PITR

Automated Backups

Neon provides continuous backup with point-in-time recovery. We also run application-level export routines for disaster recovery. Backups are retained per Neon's standard policy.

Point-in-time recovery — up to 30 days

File Storage — Cloudflare R2

Generated PDFs and export documents are stored in Cloudflare R2 with private access. Signed URLs are used for document retrieval — files are not publicly accessible without authentication.

Private bucket — signed URL retrieval only

Where we are and where we're going

We're building toward formal security certifications while operating under industry-standard practices today.

Complete

Encryption Standards (AES-256-GCM + TLS 1.2+)

All data encrypted at rest and in transit. OAuth tokens and Suez credentials use AES-256-GCM. HTTPS enforced sitewide.

Complete

Subscription-Based Access Control

API-gated waterway access per subscription tier. Middleware-enforced on all filing engine endpoints. No cross-account data leakage.

In Progress

SOC 2 Type II Certification

Formal SOC 2 Type II audit in preparation. Target completion: Q3 2026. This will cover security, availability, and confidentiality trust service criteria.

Planned

GDPR Data Processing Agreement (DPA)

Formal DPA document available for EU-based operators and brokers who require a signed DPA under GDPR Article 28. Contact us to request one.

Planned

Penetration Testing Program

Third-party penetration testing scheduled for Q4 2026. Results and remediation will be documented and available to enterprise customers on request.

We back our availability with transparency

Our target SLA is 99.9% uptime. We publish real-time status and incident history so you always know what you're working with.

Application uptime (trailing 90 days)
99.8%
API response time (p95, trailing 7 days)
142ms
Status page
Coming soon
Incident communication SLA
Email within 2 hours
Maintenance window notifications
72h advance notice

SLA metrics reflect production environment data. A dedicated status page with real-time monitoring and incident history is in development and will be available at status.canalclear.org before Q3 2026.

Where your data lives

Operational data for CanalClear is hosted in the United States (AWS us-east-1). This may change as we expand regional availability.

Primary Database

Neon PostgreSQL hosted in AWS us-east-1 (Northern Virginia). Point-in-time recovery backed up continuously.

File Storage

Cloudflare R2 (US region) for PDF documents and export files. Private bucket — no public access.

Payments

Stripe processes all payments in the US under Stripe's own privacy policy and PCI DSS Level 1 compliance.

EU / GDPR Note

If you operate under GDPR jurisdiction and require data residency in the EU, or need a signed Data Processing Agreement (DPA), contact us at security@canalclear.org. We can accommodate EU data residency requirements for enterprise accounts on request.

Report vulnerabilities to us directly

We welcome responsible disclosure from security researchers. If you've found a vulnerability, here's how to reach us.

How to Report

If you discover a security issue in CanalClear, please contact us at security@canalclear.org. Include as much detail as possible — affected URL, description of the vulnerability, and steps to reproduce (if applicable).

Need a security review for your fleet operation?

Enterprise security reviews, custom DPAs, and dedicated compliance documentation are available for fleet operators and P&I clubs.