Security

Inframorph follows best practices across authentication, authorization, and content security.

Two-Factor Authentication (2FA)

  • Recommended for all users.
  • Setup: Go to your profile/security settings and follow the on-screen steps.
  • Use an authenticator app for codes; store backup codes securely.

Access control

  • Role-based access: Your permissions depend on your role and tenant settings.
  • Module entitlements: Visibility of some modules (e.g., Incident Management) depends on plan/entitlement.

Sessions

  • Sign out of unused sessions.
  • Avoid sharing accounts.

Content Security Policy (CSP)

  • Inframorph uses a strict CSP. If third-party widgets are blocked, contact support.

Data protection

  • Follow your company’s data policies.
  • Do not paste secrets into tickets or screenshots.

Best practices

  • Enforce 2FA for everyone.
  • Review access regularly (users, roles, entitlements).
  • Rotate credentials and revoke access for leavers promptly.