How we protect your certificates
AlertaCert stores critical tax credentials. These are the specific technical measures we apply, without marketing euphemisms.
AES-256-GCM encryption at rest
All certificate files (.p12, .cer, .key, .pem) are stored encrypted with AES-256-GCM. Certificate passwords are never stored in plain text — they are encrypted before being written to the database.
Authentication with access key (Passkey / WebAuthn)
AlertaCert supports biometric access keys (Face ID, fingerprint, Windows Hello) as a second factor of authentication. Access keys are resistant to phishing by design — they are never transmitted to the server.
Re-authentication for sensitive actions
High-risk actions — revealing password, downloading certificate, deleting, signing documents, managing members — require recent re-authentication. If your session is old, you will be asked to confirm your identity before proceeding.
Role-based access control
Each organization has administrator and member roles. Members cannot invite users, change roles, delete customers, or cancel signing flows. Administrators control exactly which permissions are sensitive in their organization.
Immutable audit log
Each sensitive action — upload, download, password reveal, signing, deletion, role change — is logged to an audit log. The log has no INSERT policy for normal users: only the service client can write to it.
Rate limit on sensitive endpoints
Upload, download, signing, and authentication endpoints have rate limits per user. Excessive attempts are blocked before reaching the database.
Row-Level Security across the entire database
Each database table has RLS (Row-Level Security) enabled. One organization's data is inaccessible from another organization's queries, even if the same database instance is used.
Validation of files on upload
Each uploaded file is validated by magic bytes before storage. A file that is not valid DER/PKCS12 or PEM is rejected. No arbitrary files disguised as certificates are ever stored.
Third-party infrastructure
AlertaCert does not operate its own servers. We trust certified infrastructure providers.
What we never do
- ✕Sell or share certificate data with third parties
- ✕Store certificate passwords in plain text
- ✕Transmit certificate files to external services (except to encrypted storage)
- ✕Use advertising tracking cookies
- ✕Record file content — only metadata (name, type, expiration)
Did you find a vulnerability or have security questions?
support@alertacert.com