Private household records
Family Assets
Why households can trust us with sensitive records.
Family Assets is built for private household operations, where trust is part of the product itself. Our controls are designed around the standard serious customers expect in ISO 27001 and SOC 2 style reviews, with clear attention to access control, protected infrastructure, secure authentication, disciplined change management, and data handling.
Current controls
High-level controls behind the current implementation
These are the control areas that matter most when evaluating whether a product can responsibly hold private household data.
Public traffic is forced onto HTTPS rather than left to optional transport security.
Certificates are managed through AWS Certificate Manager for the public application surface.
Application secrets are handled through AWS Secrets Manager instead of being embedded in deployable artifacts.
Storage resources in the stack are configured with encryption and blocked public access by default.
Authentication is delegated to Auth0 rather than implemented as a custom identity system.
The backend validates issuer, audience, and signing material before accepting tokens.
Session cookies are signed, HttpOnly, and marked Secure in production.
Refresh handling stays in the SSR session flow instead of relying on browser storage APIs for long-lived tokens.
Authorization decisions are backed by Cedar rather than scattered one-off checks.
Policies and schema are validated at startup so broken authorization definitions fail before serving requests.
Permissions are expressed explicitly for create, list, read, update, and delete operations.
Critical business safeguards still sit behind service-level protections, including owner-protection rules.
Core entity operations rely on validated request models rather than permissive free-form payloads.
Domain-specific validators protect important record rules such as relationship structure and phone formatting.
Frontend changes must pass formatting, typing, linting, and build checks in CI.
The primary database is not publicly exposed and runs in private isolated subnets.
Database credentials are generated and stored in managed secret storage.
Operational logging and container visibility are enabled for the running environment.
Backups and database log export are part of the deployed stack.
Frontend CI requires formatting, typechecking, linting, and a production build.
Backend CI runs formatting, static analysis, tests, and strict compilation checks.
Container repositories are configured for image scanning on push.
Static analysis is part of the backend build rather than an afterthought.
Cedar gives us a more rigorous foundation for secure identity and access management than scattered, ad hoc permission checks. That matters in a household system where principals, relatives, staff, and advisors should not all inherit the same view of the record.
We pair policy-driven access control with service-level safeguards for critical invariants, such as owner protection. That combination is closer to the control discipline expected in mature enterprise software than a simple role toggle model.
Continue your review
See how the product model and the trust model fit together.
If you are evaluating Family Assets for a principal household, advisor workflow, or family office setup, the next useful step is usually to review the feature model and the operating use cases alongside the trust controls.