🔒 Security

Learn about EasySign's security features and best practices.

Data Encryption

Encryption at Rest

All uploaded documents are encrypted using AES-256-CBC before being stored on disk.

Encryption in Transit

All data is transmitted over HTTPS/TLS 1.2+:

Authentication

Password Security

Two-Factor Authentication (MFA)

Session Management

Access Control

Rate Limiting

IP/Email/Domain Blocking

Administrators can block:

Role-Based Access

Role Access
User Own documents only
Org Admin Organization documents + member management
Admin Full system access

Application Security

SQL Injection Prevention

XSS Prevention

CSRF Protection

Security Headers

All responses include:

X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Strict-Transport-Security: max-age=31536000; includeSubDomains
Referrer-Policy: strict-origin-when-cross-origin
Content-Security-Policy: default-src 'self' https:; ...

File Upload Security

Audit Trail

All security-relevant actions are logged:

Logs include timestamp, user ID, IP address, and action details.

Legal Compliance

E-Signature Validity

EasySign signatures are legally binding under:

Audit Certificates

Each completed document includes a certificate with:

Vulnerability Management

Built-in security scanner (Admin → Security Scanner):

Security Best Practices

For Administrators

  1. Use strong, unique passwords for admin accounts
  2. Enable two-factor authentication
  3. Regularly review audit logs
  4. Keep PHP and dependencies updated
  5. Run vulnerability scanner weekly
  6. Use HTTPS with a valid SSL certificate
  7. Backup database and encryption key separately

For Users

  1. Use a strong password (12+ characters)
  2. Enable two-factor authentication
  3. Don't share signing links
  4. Verify signer email addresses carefully
  5. Log out when using shared computers

Reporting Security Issues

If you discover a security vulnerability:

  1. Do not publicly disclose the issue
  2. Email security details to the administrator
  3. Include steps to reproduce
  4. Allow time for a fix before disclosure