Last updated: 24 February 2026
Your financial records, employee data, and customer information are the lifeblood of your business. We treat their protection as a core product requirement, not an afterthought. This page describes the measures we take to keep your data safe.
Kujalia ERP runs on Amazon Web Services in the af-south-1 (Cape Town) region. Your data stays in South Africa.
| Layer | Method |
|---|---|
| In transit | TLS 1.2+ enforced on all connections. HTTPS only — HTTP requests are redirected. |
| At rest (database) | AES-256 via Amazon RDS storage encryption. |
| At rest (backups) | AES-256 encrypted automated snapshots. |
| Passwords | Hashed with bcrypt (cost factor 10+). Never stored or logged in plain text. |
Every API request passes through our createApiHandler middleware, which enforces authentication, role-based access, and tenant isolation in a single place.
| Role | Permissions |
|---|---|
| Viewer | Read-only access to reports and dashboards. |
| Member | Read and write access to day-to-day operations (invoices, contacts, inventory). |
| Accountant | Member permissions plus journal entries, bank reconciliation, and financial reports. |
| Manager | Accountant permissions plus approvals, HR management, and compliance features. |
| Admin | Full access including user management, settings, integrations, and audit logs. |
Tenant isolation — every database query is scoped to the authenticated tenant. There is no mechanism for one tenant to access another tenant's data.
All significant actions are recorded in an immutable audit log, including who performed the action, what changed, when it happened, and from which IP address. Audit logs are retained for 2 years and are accessible to admin users from the platform. Sensitive fields (passwords, tokens, bank account numbers) are automatically masked in log output.
We build with security as a default, not a bolt-on:
We recommend that you also maintain your own exports of critical data using the platform's built-in CSV and PDF export features.
In the event of a security incident, we follow a structured response process:
If you discover a security vulnerability in Kujalia ERP, we ask that you report it responsibly. Please email security@kujalia.co.za with a description of the issue, steps to reproduce, and any supporting evidence. We commit to acknowledging your report within 48 hours and will work to resolve verified vulnerabilities promptly. We will not take legal action against researchers who act in good faith and follow responsible disclosure practices.
Security is a shared responsibility. We recommend that all users:
For security questions, vulnerability reports, or to request further detail about our security practices: