Security overview

Plain-language description of how CapchaCloud is built and operated on Cloudflare.

This page is descriptive. It is not a SOC 2 Type II report, ISO certificate, or guarantee that you will pass any audit or law.

Platform architecture (summary)

Control alignment (illustrative)

Procurement teams often map vendors to trust criteria. Below is a non-exhaustive alignment map — not an assertion of audit readiness.

ThemeOur posture
Logical accessSeparate admin vs tenant surfaces; API keys hashed; optional platform-scoped keys.
Change managementInfrastructure-as-code (Wrangler), versioned migrations, peer review for application changes.
Logging & monitoringStructured Worker logs; security audit table in D1; hash-chained entries for tamper evidence on new events.
EncryptionTLS in transit to Cloudflare; provider-managed encryption at rest for bound services.
Vendor managementSubprocessor list + notice policy; reliance on Cloudflare/Stripe subprocessors’ programs.

All topics · Shared responsibility