Trust & Safety

Security at Dealer-OS

Your dealership’s data — customer records, deals, financials, inventory — is sensitive. We treat it that way. Here’s exactly how we protect it.

Last updated: March 2, 2026

Security at a Glance

🔒

TLS 1.2+ Encryption

All data in transit is encrypted using TLS 1.2 or higher. We enforce HTTPS across every endpoint with no plain-HTTP fallback.

🛡️

AES-256 at Rest

All data stored in Google Cloud Firestore and Firebase Storage is encrypted at rest using AES-256 by default.

🏗️

Google Cloud Infrastructure

We run entirely on Google Cloud (Firebase), which holds SOC 2 Type II, ISO 27001, PCI DSS, and FedRAMP certifications.

🔑

Role-Based Access

Granular role-based access control (RBAC) ensures staff can only see and edit the data their role requires.

🔐

Secure Authentication

Firebase Authentication with support for MFA. Session cookies are HTTP-only, Secure-flagged, and CSRF-protected.

🚨

24/7 Monitoring

Google Cloud's built-in threat detection, anomaly monitoring, and audit logging run continuously across our infrastructure.

1. Infrastructure & Hosting

Dealer-OS is built on Google Firebase and Google Cloud Platform (GCP), with all services hosted in the United States (us-central1 / us-east1 regions by default).

  • Firestore: multi-region replication with automatic backups and point-in-time recovery.
  • Firebase Storage: object storage for vehicle images and generated documents, with bucket-level security rules restricting access per dealer.
  • Cloud Functions (Gen2): server-side logic runs in isolated, ephemeral containers — no persistent shared state between requests.
  • Next.js on Vercel: the web application layer runs on Vercel’s edge network with DDoS protection and automatic HTTPS.

Google Cloud’s compliance certifications include SOC 1/2/3, ISO 27001/27017/27018, PCI DSS, HIPAA, and FedRAMP High. You can review Google’s compliance posture at cloud.google.com/security/compliance.

2. Data Encryption

In Transit

All communication between your browser or mobile device and Dealer-OS servers is encrypted using TLS 1.2 or TLS 1.3. We use HTTP Strict Transport Security (HSTS) headers to prevent protocol downgrade attacks. Certificate management is handled by Vercel and Google with automatic renewal.

At Rest

Data stored in Firestore and Firebase Storage is encrypted at rest using AES-256. Google manages encryption keys using its Key Management Service (KMS). Sensitive fields (e.g., OAuth refresh tokens) receive an additional layer of application-level encryption before storage.

OAuth Tokens

Third-party OAuth tokens (e.g., Gmail refresh tokens) are encrypted before being written to the database. Tokens are never logged, transmitted in plaintext, or exposed to client-side code. They are deleted immediately upon integration disconnection or account deletion.

3. Authentication & Session Management

  • Authentication is handled by Firebase Authentication, which supports email/password, Google Sign-In, and multi-factor authentication (MFA).
  • Sessions are maintained via HTTP-only, Secure, SameSite=Lax cookies (dealer_os_session) to prevent XSS-based token theft.
  • OAuth flows include a CSRF state parameter (cryptographically random 32-byte hex token stored in an HTTP-only cookie, valid for 10 minutes) to prevent cross-site request forgery.
  • Session cookies have a finite lifetime and are invalidated on logout. Server-side session verification is performed on every authenticated API request.
  • Failed authentication attempts are rate-limited by Firebase Authentication to prevent brute-force attacks.

4. Access Control

Dealer-OS implements strict multi-layer access control:

Tenant Isolation

Each dealership is a separate tenant. Firestore Security Rules and server-side checks enforce that users can only read and write data belonging to their own dealership. There is no shared data pool between dealers.

Role-Based Access Control (RBAC)

Within a dealership, access is governed by roles (Owner, Manager, Sales, Finance, etc.). Each role has a defined permission set enforced at both the API and Firestore rule levels. Employees see only the data and actions permitted by their role.

Internal Access (Dealer-OS Staff)

Dealer-OS engineering and support staff access to production data is restricted by role, logged, and limited to what is necessary to operate and support the service. No Dealer-OS employee has standing read access to individual dealer customer records without a documented support reason.

5. API & Application Security

  • All API routes require authentication; unauthenticated requests receive 401 responses.
  • Input validation and sanitization are applied to all user-supplied data before processing or storage.
  • Generated documents (PDFs) are produced server-side and served via signed, time-limited URLs — never stored publicly.
  • Third-party API keys (Google Maps, Stripe, etc.) are stored as server-side environment variables and are never exposed to the client.
  • Stripe webhooks are verified using Stripe-Signature header validation with our webhook secret to prevent spoofed payment events.
  • Content Security Policy (CSP), X-Frame-Options, X-Content-Type-Options, and Referrer-Policy headers are set on all responses.

6. Monitoring, Logging & Incident Response

We maintain comprehensive audit trails for security-relevant events:

  • Firebase Authentication logs all sign-in events, token refreshes, and failed login attempts.
  • Cloud Functions log all API invocations, errors, and response times in Google Cloud Logging with a 12-month retention.
  • Anomalous access patterns (unusual login locations, bulk data reads) trigger automated alerts reviewed by our team.

Incident Response

In the event of a confirmed data breach affecting your personal information, we will notify affected users within 72 hours of becoming aware of the incident (as required under GDPR Article 33) via email and in-platform notification. Notifications will include: nature of the breach, categories of data affected, approximate number of individuals affected, likely consequences, and measures we have taken or propose to take.

7. Third-Party Security

We vet all sub-processors for security compliance before integration. Key providers and their security posture:

ProviderCertifications
Google Firebase / GCPSOC 2 Type II, ISO 27001, PCI DSS, FedRAMP High
StripePCI DSS Level 1, SOC 2 Type II, ISO 27001
VercelSOC 2 Type II, ISO 27001
ResendSOC 2 Type II

8. Responsible Disclosure

We take security reports seriously. If you believe you have discovered a security vulnerability in Dealer-OS, please report it to us privately before any public disclosure to allow us to investigate and remediate.

Security Contact

Email: security@dealer-os.io

Please encrypt sensitive reports using our PGP key (available on request).

What to include: description of the vulnerability, steps to reproduce, potential impact, and any proof-of-concept code (do not access or exfiltrate real user data).

Our commitment: We will acknowledge receipt within 2 business days, provide a status update within 5 business days, and keep you informed throughout the remediation process. We will not pursue legal action against researchers acting in good faith under these guidelines.

9. Questions & Contact

For general security questions or concerns, contact us:

Dealer-OS Security Team

Email: security@dealer-os.io

General: team@dealer-os.io