Plain-language description of how CapchaCloud is built and operated on Cloudflare.
Procurement teams often map vendors to trust criteria. Below is a non-exhaustive alignment map — not an assertion of audit readiness.
| Theme | Our posture |
|---|---|
| Logical access | Separate admin vs tenant surfaces; API keys hashed; optional platform-scoped keys. |
| Change management | Infrastructure-as-code (Wrangler), versioned migrations, peer review for application changes. |
| Logging & monitoring | Structured Worker logs; security audit table in D1; hash-chained entries for tamper evidence on new events. |
| Encryption | TLS in transit to Cloudflare; provider-managed encryption at rest for bound services. |
| Vendor management | Subprocessor list + notice policy; reliance on Cloudflare/Stripe subprocessors’ programs. |