Skip to main content

Your security responsibilities

What your organisation should do to keep workspace access and verification outputs secure.

Jacob avatar
Written by Jacob
Updated over 2 weeks ago

Overview

Konfir applies technical and operational controls to protect verification data within the platform. Your organisation also plays an important role in keeping access tight and handling outputs safely.

Disclaimer: This article outlines the key responsibilities customers should follow when using Konfir. For Konfir’s formal security documentation, certifications, and legal terms, refer to: https://www.konfir.com/client/security


Secure your workspace with MFA

Multi-Factor Authentication (MFA) materially reduces the risk of account takeover.

If MFA is enabled for your workspace, users will be prompted to provide a one-time code from an authenticator app when signing in. See: Enable Multi-Factor Authentication (MFA)


Manage access and permissions

Workspace access is one of the biggest drivers of real-world security risk. Keep access simple, intentional, and regularly reviewed.

Best practices include:

  • Restrict access to users who genuinely need it

  • Remove access promptly when someone leaves your organisation or changes role

  • Review access periodically, especially for privileged Admin roles

  • Avoid shared accounts or shared inboxes as Konsole user identities

Learn more: To understand role types and permissions, see: Roles & permissions, Manage users and admin access


Handle verification outputs with care

Verification results contain personal data. If you export data from Konfir (for example via API endpoints or downloaded reports), you are responsible for securing those outputs within your own systems.

Ensure downstream handling aligns with your internal policies and requirements, including:

  • Access controls

  • Secure storage

  • Retention and deletion rules

  • Appropriate internal sharing restrictions

Learn more: For retention rules governing data held in Konfir systems, refer to: Data retention and deletion lifecycle


Minimise admin access

Admins have privileged powers, including approving access requests and changing workspace settings.

Limit Admin roles to only those who require elevated access, and review Admin membership regularly.


Report suspicious activity promptly

If you believe your workspace may be at risk - for example unexpected access, unusual exports, or suspected compromise - contact Support as soon as possible. See: Reporting a suspected security issue

Did this answer your question?