DocsIdentitySecurity and Data Handling

Security and Data Handling

How to think about Identity as a sensitive system that stores onboarding and verification evidence.

Section

Baseline expectations

  • treat raw identity artifacts as high-sensitivity data
  • limit console access to operators who actually need it
  • secure webhook endpoints and signing secrets
  • separate customer-facing verification surfaces from operator workflows
Section

Boundary with WatchTower

When the same tenant uses WatchTower, pass only investigation-safe summaries across the integration boundary. The operator evidence system remains Identity.