BeakrGo to website
Docs/Security/Data isolation & retention

Data isolation & retention

Tenant isolation is enforced at the database layer, not in application code. Deletion is permanent. Retention windows are explicit and defensible.

Database-enforced Row Level Security

Beakr enforces tenant isolation at the database layer, not in application code. Even if application logic contained a bug that omitted a tenant filter, PostgreSQL itself would prevent cross-tenant data access.

How it works

Role separation

Database rolePurposeCan bypass RLS?
beakr_appAll application queriesNo
beakr_migratorSchema migrations onlyCannot read tenant data
beakr_adminInfrastructure operations onlyRestricted to infra tasks
This approach provides isolation guarantees that exceed what most single-tenant deployments offer, where a single database superuser typically has unrestricted access to all data.

Organization model

Each customer operates within their own organization. Organizations are fully isolated:

Retention periods

Data typeRetentionControlled by
User files and documentsUntil user deletesUser
Projects and workspacesUntil user deletesUser
Workflow configurationsUntil user deletesUser
Connector configurationsUntil user disconnectsUser
Application audit logs90 daysSystem
AWS API audit logs (CloudTrail)365 days active, 2 years archiveSystem
Database backups (production)30 daysSystem
S3 version history90 daysSystem

Deletion

Beakr performs hard deletes — deleted data is permanently removed, not soft-deleted or marked inactive.

When a user deletes a resource:

  1. File content is removed from S3.
  2. Metadata, search vectors, and embeddings are removed from the database.
  3. All related records (versions, citations, access grants) are cascade-deleted.
  4. An audit log entry is created.

Account deletion removes all user data across all projects, revokes all connector connections, and removes all organization memberships. Audit logs are retained for 90 days per policy.

Backup caveat

Deleted data may exist in automated backups for the backup retention period (30 days in production). After backup retention expires, deleted data is permanently unrecoverable.

Authentication & access control

Authentication

Role-based access control

RoleCapabilities
ViewerRead-only access to shared resources
MemberCreate and manage own resources
AdminManage team members and settings
OwnerFull control including billing and deletion

Access is evaluated at multiple levels: Organization (membership and role), Space (team or lab groupings with inherited permissions), and Project (granular access grants for individual projects — read, write, share). Space administrators inherit access to all projects within their space. Cross-organization sharing uses explicit, auditable access grants.

CSRF protection

All state-changing requests are protected against cross-site request forgery using Origin and Referer header validation.

Data export

Users can export their data at any time: