Security
Inframorph follows best practices across authentication, authorization, and content security.
Two-Factor Authentication (2FA)
- Recommended for all users.
- Setup: Go to your profile/security settings and follow the on-screen steps.
- Use an authenticator app for codes; store backup codes securely.
Access control
- Role-based access: Your permissions depend on your role and tenant settings.
- Module entitlements: Visibility of some modules (e.g., Incident Management) depends on plan/entitlement.
Sessions
- Sign out of unused sessions.
- Avoid sharing accounts.
Content Security Policy (CSP)
- Inframorph uses a strict CSP. If third-party widgets are blocked, contact support.
Data protection
- Follow your company’s data policies.
- Do not paste secrets into tickets or screenshots.
Best practices
- Enforce 2FA for everyone.
- Review access regularly (users, roles, entitlements).
- Rotate credentials and revoke access for leavers promptly.