JamiiAI
πŸ‡«πŸ‡· FR Back to Home

Security

Last updated: March 23, 2026

Security is foundational to Jamii AI. We protect your data, API communications, and infrastructure with multiple layers of defence. This page outlines our security practices and architecture.

1. Authentication & Authorisation

JWT Token Authentication

All protected endpoints require a signed JWT token with configurable expiration. Tokens are issued upon successful credential verification and include role-based claims.

Triple-Role Access Control

Three distinct authentication paths β€” admin, employee, and customer β€” each with separate database tables, credential verification, and JWT claims.

Row-Level Data Isolation

Customers can only access data matching their customer_number. Employees are restricted to tables listed in their allow_tables_list. Admins have full access.

2. Encryption

TLS 1.2+ In Transit

All API communications are encrypted using TLS 1.2 or higher. Plaintext HTTP connections are automatically redirected to HTTPS.

Encryption at Rest

Database storage and backups are encrypted using AES-256. API keys and secrets are stored using industry-standard key management.

Password Hashing

User passwords are hashed using bcrypt with automatically generated salts. Plain-text passwords are never stored or logged.

3. API Security

SQL Injection Prevention

All database queries use parameterised statements. Natural-language-to-SQL responses are validated and sanitised before execution. Write operations are blocked in read-only mode.

Rate Limiting

API endpoints are rate-limited per subscription tier to prevent abuse and ensure fair resource allocation across all users.

Input Validation

All API inputs are validated using Pydantic models with strict type checking, minimum length constraints, and format validation before processing.

4. Infrastructure Security

  • Network isolation β€” services run in private networks with restricted access; only API gateway endpoints are publicly accessible
  • Minimal attack surface β€” only necessary ports and services are exposed; internal services communicate over private channels
  • Dependency management β€” all dependencies are pinned and regularly scanned for known vulnerabilities
  • Container security β€” application containers run as non-root users with read-only file systems where possible

5. Monitoring & Incident Response

  • Real-time monitoring β€” API performance, error rates, and security events are monitored continuously
  • Audit logging β€” all authentication events, access control decisions, and administrative actions are logged
  • Automated alerts β€” anomalous patterns trigger immediate alerts for investigation
  • Incident response β€” we maintain a documented incident response plan with defined severity levels, escalation paths, and communication procedures
  • Post-mortem reviews β€” all security incidents are followed by a thorough review to prevent recurrence

6. Development Practices

  • Secure SDLC β€” security is integrated into every stage of development, from design through deployment
  • Automated testing β€” 493 automated tests covering authentication, access control, input validation, and API behaviour
  • Static analysis β€” code is continuously analysed with Ruff for style, correctness, and potential security issues
  • Code review β€” all changes undergo peer review before merging
  • Least privilege β€” services and database connections operate with the minimum permissions required

7. Compliance

We are committed to meeting industry standards and regulatory requirements. Our security practices align with:

  • OWASP Top 10 mitigation guidelines
  • GDPR and data protection principles
  • SOC 2 Type II principles (Security, Availability, Confidentiality)

8. Responsible Disclosure

If you discover a security vulnerability in our Service, we encourage responsible disclosure. Please report it to:

security@jamiiai.com

We ask that you:

  • Do not publicly disclose the vulnerability before we have had a chance to address it
  • Provide sufficient detail for us to reproduce and fix the issue
  • Allow reasonable time for remediation before disclosure

We will acknowledge receipt within 48 hours and aim to resolve critical issues within 7 days.

9. Contact

For security-related questions or to report a concern:

  • Email: security@jamiiai.com
  • Website: www.africadigitalizer.com

© 2026 Jamii AI. All rights reserved.

Powered by Africa Digitalizer

Privacy Terms Security