Identity
Role-based access control
Separate policies for owners, agencies, providers, and administrators with least-privilege defaults.
FixSell
Sale-readiness control room
Security posture
This application is structured around the assumption that agreements, compliance reports, property data, invoices, and identity artifacts are sensitive. The recommended production posture is private object storage, role-scoped access, signed retrieval, complete audit trails, and staff MFA.
Immediate hosting baseline
Identity
Separate policies for owners, agencies, providers, and administrators with least-privilege defaults.
Storage
Agreements and reports belong in private buckets only, encrypted at rest and retrieved with signed URLs.
Audit
All document uploads, views, downloads, and permission changes should be logged for review and retention.
Platform
CSP, HSTS, secure cookies, environment-managed secrets, malware scanning, and automated backups.
Required controls for production
Store agreements, invoices, property reports, and IDs in non-public buckets with encryption and short-lived signed URL access.
Use per-record authorization tied to authenticated user role and tenancy, never broad path-based public access.
Enable object-level logging, anomalous download alerts, malware scanning, and immutable retention for signed agreements.
Apply CSP, HSTS, CSRF protection, secure cookies, secrets rotation, MFA for staff, and tested disaster recovery.