Skip to main contentSkip to navigation

Security at TankActive

This page describes TankActive security practices at a high level. It is not a certification registry or legal policy substitute.

Security information with conservative claims

TankActive only states public security claims here that are supported by the product and policy surfaces in this repository.

Security Practices

Encryption in Transit

TankActive uses HTTPS/TLS for web traffic and protects authentication and operational data in transit.

Secure Authentication

The platform uses authenticated access, password hashing, token rotation, and session controls to reduce unauthorized access risk.

Access Controls

Role-aware access checks, administrative separation, and audit-oriented workflows are used across the product.

Data Handling

TankActive supports account deletion workflows and limits retained personal data to what is required for operations and compliance.

Review Notes

No unsupported certification claims

This page intentionally avoids claiming certifications or audit outcomes that are not publicly documented here.

Policy-backed privacy information

Use the privacy policy and account-deletion page for retention, deletion, and user-rights details.

Direct escalation path

Security questions and urgent concerns should be routed through support for review and response.

Operating Principles

Application Security

  • Secure coding and code review practices
  • Input validation and request hardening
  • Content Security Policy and browser security headers
  • Authentication and authorization checks

Data Security

  • Protected transport for operational and authentication traffic
  • Scoped storage access and database query controls
  • Token revocation during account lifecycle changes
  • Secure account deletion and anonymization workflows

Access Management

  • Password reset protections
  • Role-aware access restrictions
  • Administrative separation for user-management actions
  • Session and token lifecycle controls

Operational Security

  • Operational monitoring and logging
  • Controlled deployment workflows
  • Post-deploy smoke checks
  • Direct escalation path through support

Report Security Concerns

Security Questions

Send security-related questions or concerns to support

Urgent Security Issues

For critical issues requiring immediate attention